Net+ Quiz 3 Flashcards

1
Q

Which of the following is a type of denial of service attack?

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is not a type of threat that can affect your network?

A

access control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of virus impacts files with the filename extensions .com, .exe, and .dll?

A

file viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In which type of attack does the attacker scan for networks using a high-powered antenna connected to a wireless laptop?

A

WEP INCORRECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Monkey B, Michelangelo, Stoned, and Stealth boot are examples of which type of virus?

A

boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of virus affects both the boot sector and files on a computer?

A

multiparte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main difference between a worm and a virus?

A

worms can replicate without user intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of attack involves the hacker attempting all combinations of characters for a password to gain access?

A

brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of security threat allows an attacker to learn your password through the use of an email or phone call?

A

man-in-the-middle INCORRECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of policy should be implemented to secure important company documents and materials when employees leave thier workstations?

A

clean desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you implement a set of policies and procedures that define corporate information as confidential and then train employees on these procedures, what type of attack can you prevent?

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of wireless frame populates the display when someone is scanning for Wireless Networks?

A

SSID INCORRECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What defines the appropriate response to a security event on a network?

A

implementing security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following security mechanisms has been compromised?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What process allows you to update your Windows-based operating system?

A

windows update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is it important to keep your system patched and up-to-date?

A

to fix system vulnerabilities

17
Q

Which value does a wireless station use to choose an access point?

A

SSID

18
Q

Which type of scanning allows an antivirus program to search for a virus even if there is no definition for it?

A

heuristic scan

19
Q

What type of files need to be updated in order for your antivirus program to have the latest information about attacks and viruses?

A

definition files

20
Q

What type of scan can be done by an antivirus program?

A

all of the above

21
Q

In which layer of the OSI model do software firewalls operate? (Choose all that apply)

A

application

22
Q

What is the main difference between a network-based firewall and a host-based firewall?

A

A network-based firewall protects a network, not just a single host.

23
Q

What is the benefit of using a firewall?

A

protects LAN resources

24
Q

What is it called when the firewall ignores an attack?

A

false negative INCORRECT

25
Q

What is the function of a DMZ?

A

create security zone that allows private traffic but is isolated from public INCORRECT

26
Q

Which type of security device monitors network traffic, looking for signs of an intrusion?

A

IDS

27
Q

Which of the following is NOT a function of NMAP?

A

collects passwords

28
Q

Changing network configurations, terminating sessions, and deceving the attacker are actions that can be taken from what type of security device?

A

IPS

29
Q

A _______________ firewall keeps track of the established connections passing through it.

A

network INCORRECT

30
Q

UTP cable has specific colors for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct color order, starting with pin 1?

A

orange, white orange INCORRECT

31
Q

UTP cables use which type of connector?

A

RJ-45

32
Q

You have upgraded the firmware on your switches and access points. What documentation do you need to update?

A

Wiring Schematics INCORRECT

33
Q

Which type of Windows server log will give information about specific programs?

A

application

34
Q

Which network-performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications?

A

Load balancing INCORRECT

35
Q

To optimize performance on your network, which of the following control traffic in some way?

A

all of the above