Ch 9: Network Risk Management Flashcards

1
Q

What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?

A

metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements correctly describes the malware characteristic of polymorphism?

A

Polymorphic malware can change its characteristics every time it is transferred to a new system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements describes a worm?

A

A program that runs independently of other software and travels between computers and across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

A

honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?

A

man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following scenarios represents a phishing attempt?

A

An e-mail was sent to a manager at your company that appeared to be from the company’s CTO, asking for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a red team-blue team exercise, what is the purpose of the blue team?

A

The blue team is charged with the defense of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?

A

quid pro quo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

A

tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the typical social engineering attack cycle, what occurs at Phase 3?

A

The attacker exploits an action undertaken by the victim in order to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?

A

principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What statement regarding denial-of-service (DoS) attacks is accurate?

A

A denial-of-service attack prevents legitimate users from accessing normal network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Utilized by China’s so-called “Great Firewall”, what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Nmap utility used for?

A

It is a port scanning utility that can identify open ports on a host.

17
Q

How is a posture assessment performed on an organization?

A

A thorough examination of each aspect of the organization’s network is performed to determine how it might be compromised.

18
Q

What type of door access control is a physical or electronic lock that requires a code in order to open the door?

A

cipher lock

19
Q

An RFID label on a box is an example of what type of physical security detection method?

A

asset tracking tagging

20
Q

What statement regarding the different versions of the SHA hashing algorithm is accurate?

A

SHA-2 and SHA-3 both support the same hash lengths.

21
Q

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

A

sha256sum

22
Q

Which command can be used on a Windows system to create a hash of a file?

A

Get-FileHash

23
Q

VMware’s AirWatch and Cisco’s Meraki Systems Manager are both examples of what type of software?

A

mobile device management software

24
Q

A variant of BYOD, what does CYOD allow employees or students to do?

A

They can choose a device from a limited number of options.

25
Q

Where would restrictions regarding what users can and cannot do while accessing a network’s resources be found?

A

acceptable use policy document

26
Q

What document addresses the specific concerns related to special access given to administrators and certain support staff?

A

privileged user agreement

27
Q

Which of the following scenarios would necessitate the use of a non-disclosure agreement?

A

Your company needs to prevent a new contractor from sharing information with a potential competitor.

28
Q

How often should you require users to change their passwords?

A

every 60 days

29
Q

What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?

A

deauthentication attack

30
Q

Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?

A

distributed reflection denial-of-service attack