- A __________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media. Network sniffer
- a birthday attack is a type of logic bomb virus that releases its payload on some famous persons birthday false
- A fail-secure lock is unlocked in a power interruption. False
- A mantrap is used to combat tailgaiting True
- A NIDS signature database is much larger than a HIDS system True
- A person’s weight is a biological factor that can be used for authentication False
- A port number is a way to identify a specific computer to which an Internet or other network message is to be forwarded. FALSE
- A protocol defines a number of agreed-upon parameters, such as the data compression method, the type of error checking to use, and mechanisms for systems to signal when they have finished either receiving or transmitting data. True
- A security professional must understand how the various TCP/IP protocols operate. True
- Access tokens are defined as something you know False
- another term for defense in depth is layered security True
- Besides physically securing access to your computers you can do very little to prevent drive imaging True
- Besides physically securing access to your computers, you can do very little to prevent drive imaging. False
- Context-based signatures match a pattern of activity based on the other activity around it such as a port scan True
- Encapsulation is the concept of separating items so that they cannot interfere with each other. False
- Hostile activity that does not match an IDS signature and goes undetected is called a false positive False
- Implicit deny applies to situations involving both authorization and access true
- In a __________ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network. Smurf
- In most security circles, security through obscurity is considered a good approach, especially if it is the only approach to security. False
- In terms of physical security, which term refers to protecting important assets by using multiple perimeters? Layered access
- Ip address main rule Can not exceed 255
- Johnny receives a “new version” of the game Solitaire in an e-mail. After running the program, a backdoor is installed on his computer without his knowledge. What kind of an attack is this? Trojan
- layered access is a form of defense in depth True
- Making data look like it came from a different source is called Spoofing
- Most networks are dominated by Ethernet/internet protocol TRUE
- OSI model Please Do Not Throw Sausage Pizza Away
- Packet fragmentation is the splitting of a packet while in transit into two packets so that they can get past an MTU bottleneck. True
- RST gracefully terminates the connection and FIN abruptly tells the other side to stop communicating. False flip it
- Size of MAC Address 12 Hex numbers expresses as:
00:07:e9:c8:ff:00 - Switches are essentially small computers that perform a variety of intelligent tasks. False
- SYN flooding is an example of a __________. DOS attack
- TCP is a connectionless protocol FALSE
- The gateway address (or default gateway) is a switch interface connected to the local network that sends packets out of the local network. False
- the misuse detection model is more difficult to implement than the anomaly detection model False
- The ping of death is a type of MITM attack False
- The primary defense against a majority of physical attacks are walls, fences, gates, and doors. True
- The term __________ refers to software that has been designed for some nefarious purpose. Malware
- Three-Way handshacke 1. SYN
2.SYN/ACK
3.ACK - To which distinct areas do physical security policies and procedures relate Computers and users
- Traffic that is encrypted will typically pass by an intrusion prevention system True
- UDP uses a three-way handshake to establish connections. False
- What is an advantage of a host-based IDS It can reduce false-positive rates
- What is an advantage of a network based IDS Fewer systems
- What is one difference between the misuse and anomaly IDS models? Anomaly models require knowledge of normal activity, whereas misuse models do not.
- What is one of the most fundamental principals in security Least privilege
- What relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information or access the attacker would not normally be entitled to. Social engineering
- What security design principle states that secrecy itself cannot be relied upon as a means of protection? Open Design
- What term refers to a piece of code that sits dormant for a period of time until some event invokes its malicious payload? Logic Bomb
- What type of software records and reports on activates Spyware
- Which component of an IDS examines the collected network traffic and compares it to known patterns of suspicious or malicious activity stored in the signature database? Analysis Engine
- Which security concept uses the approach of protecting something by hiding it? Security Through Obscurity
- Which security principal states that if you have not specifically been allowed access then it should be denied? Implicit Deny
- Which security principle is characterized by the use of multiple, different def mechanisms with a goal of improving defensive response to an attack Defense in depth
- Which security principle is described as always using simple solutions when available Economy of mechanism
- Which security principle refers to the concept that each and every request should be verified? Complete Mediation
- Which security principle states that access should be based on more than one item? Separation of privilege
- Which statement accurately summarizes the “security problem”? physical access negates all other security measures
- Which statement describes the main difference between TCP and UDP packets? TCP packets care connection oriented & UDP packets are connectionless
- Which term defines a collection of predefined activity patterns that have already been identified and categorizd Signature database
- Which term describes an operating system distribution specifically designed to run the entire machine from an optical disc without using the hard drive? LiveCD
- Which term is used when separation of privilege is applied to people Separation of duties
- Which term refers to a form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality? Rootkit
- Which term refers to a repository of alarms that an IDS has recorded? Alarm storage
- Which term refers to any media used to boot a computer into an operating system (OS) that is not the native OS on its hard drive? Bootdisk
- Which term refers to invocation of conditions that fall outside the normal sequence of operation Fail-safe defaults
- Which term refers to making different layers of security dissimilar so that an attacker can not get through all of them Diversity of defense
- Which tool has been the de facto standard IDS engine since its creation in 1998? SNORT
Other Links:
See other websites for quiz:
Check on QUIZLET