Chapter 9 Flashcards

1
Q

Different types of organizations have similar levels of network security risks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The term malware is derived from a combination of the words malicious and software.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A hacker, in the original sense of the word, is someone with technical skills and malicious intent.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The day after Patch Tuesday is informally Exploit Wednesday.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A drop ceiling could be used by an intruder to gain access to a secured room.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Over a long distance connection, using SSH keys is more secure than using passwords.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The original version of the Secure Hash Algorithm was developed by MIT.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Current research indicates that a long, random string of words, such as correct horse battery staple is much more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is ideal to use the same password for multiple different applications, provided the password is complex enough.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?

A

metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements correctly describes the malware characteristic of polymorphism?

A

Polymorphic malware can change its characteristics every time its transferred to a new system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what kind of malware?

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements describes a worm?

A

A program that runs independently of other software and travels between computers a across networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?

A

Man-in-the-Middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following scenarios represents a phishing attempt?

A

An email was sent to a manager at your company that appeared to be from the company’s CTO, asking for access

18
Q

In a red team blue team exercise, what is the purpose of the blue team?

A

The blue team is charged with defending the network

19
Q

Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?

A

Nessus

20
Q

If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking palce?

A

Quid pro quo

21
Q

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

A

Tailgating

22
Q

In the typical social engineering attack cycle, what occurs in Phase 3?

A

The attacker exploits an action undertaken by the victim in order to gain access

23
Q

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?

A

Principle of least privilege

24
Q

What statement regarding denial of service attacks is accurate?

A

A denial of service attack prevents legitimate users from accessing normal network resources

25
Q

Utilized by China’s so called “Great Firewall”, what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

A

DNS poisoning

26
Q

What is the Nmap utility used for?

A

It is a port scanning utility that can identify open ports on a host

27
Q

How is a posture assessment performed on an organization?

A

A thorough examination of each aspect of the organization’s network is performed to determine how it might be compromised

28
Q

What type of door access control is physical or electronic lock that requires a code to open the door?

A

Cipher lock

29
Q

An RFID label on a box is an example of what type of physical security detection method?

A

Asset tracking tagging

30
Q

What statement regarding the different versions of the SHA hashing algorithm is accurate?

A

SHA-2 and SHA-3 both support the same hash lengths

31
Q

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

A

sha256sum

32
Q

What command can be used on a Windows system to create a hash of a file?

A

Get-FileHash

33
Q

VMware’s AirWatch and Cisco’s Meraki Systems Manager are both examples of what type of software?

A

Mobile device management software

34
Q

A variant of BYOD, what does CYOD allow employees or students to do?

A

They can choose a device from a limited number of options

35
Q

Where would restrictions regarding what users can and cannot do while accessing a network’s resources be found?

A

Acceptable use policy document

36
Q

What document addresses the specific concerns related to special access given to administrators and certain support staff?

A

Privileged user agreement

37
Q

Which of the following scenarios would necessitate the use of a non disclosure agreement?

A

Your company needs to prevent a new contractor from sharing information with a potential competitor

38
Q

How often should you require users to change their passwords?

A

Every 60 days

39
Q

What type of attack forces clients off a wireless networ, creating a form of Wi-Fi DoS?

A

Deauthentication attack

40
Q

Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?

A

Distributed reflection denial of service attack