Final Exam MCQs Flashcards
(64 cards)
Can disaster recovery be a task for the information security department/division?
True
Can applications like John the Ripper crack passwords by looking on the Internet for matches?
False
In addition to access control, what is important?
Authentication
What can SQL injection attacks be prevented by?
Using input validation
Why were we able to see the password in the lab even though the FTP authentication was not successful?
The packet submitted the password in clear text
Is a URL/FQDN only used for accessing websites?
False
What can hackers use the whois command for?
Pinpoint a person to socially engineer
How can DNS be secured?
All of the Above
What does an SSL certificate assure?
That the site is valid
If your host wants to access the site www.thestockmans.net, who does it first ask for the IP address?
The host’s assigned DNS server
What is SQL Injection?
An attack exploited through a webpage
Does HTTP use a different port than HTTPS?
Yes
Does formatting a drive on your computer immediately remove the files from the disk?
False
How do hosts map an IP address to a MAC address for LAN traffic?
By querying its locally stored arp cache
At which layer is a MAC address used?
Layer 2
How are packets addressed on a LAN?
Using MAC addresses
What is used once something goes across LANs?
IP addresses
What is running a nmap scan on a network often considered?
A violation of the network use policy
How do we enable ingress filtering?
By blocking incoming SYN packets
What do host-based firewalls do?
Block incoming network traffic into our system; since it blocks ports
When accessing a website, what will your computer generally connect with?
All of the above
What mechanisms can reduce the insider threat?
Proper monitoring and logging of system usage, tracking employee satisfaction, applying the process of least privileges
Therefore, all of the above
What is encryption used to assure?
Confidentiality, Identity, Integrity
Therefore, all the above
What are zero day vulnerabilities?
Previously unknown vulnerabilities