flashcards
(75 cards)
Which example of malicious code would be classified as a Trojan horse?
malware that was written to look like a video game
What is the difference between a virus and a worm?
Worms self-replicate but viruses do not.
Which attack involves a compromise of data that occurs between two end points?
man-in-the-middle attack
Which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities?
reconnaissance
A network engineer is examining the operating system of a network device for vulnerabilities
Technological weakness
when implementing an access list on a router, a network engineer did not filter a type of malicious traffic
configuration weakness
The network administrator did not fully consider the implications of unauthorized users
security policy weakness
installing a virus code to destroy surveillance recordings for certain days
Data loss
pretending to be someone else by using stolen personal information to apply for a credit card
Identity theft
preventing users from a website by sending a large number of link requests in a short period
Disruption of service
obtaining trade secret documents illegally
Information theft
prevents or allows access based on port numbers used in the request
Application filtering
Prevents or allows access based on whether the traffic is in response to requests from internal hosts.
Stateful packet inspection
Prevents or allows access based on web addresses or keywords
URL filtering
Prevents or allows access based on the IP or MAC addresses of the source and destination.
Packet filtering
What is the purpose of the network security authentication function?
to require users to prove who they are
Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?
stateful packet inspection
When applied to a router, which command would help mitigate brute-force password attacks against the router?
login block-for 60 attempts 5 within 60
create a local user
SSH configuration step 1
Generate RSA keys
SSH configuration step 2
configure a domain name
SSH configuration step 3
Use the local login command
SSH configuration step 4
use the transport input ssh command
SSH configuration step 5
What feature of SSH makes it more secure than Telnet for a device management connection?
login information and data encryption