What can be deployed to intercept and log network traffic passing through the network?
protocol analyzers
What attack involves impersonating another device?
Spoofing
Packet sniffing can be helpful in detecting rogues.
True
Which of the following is NOT a means used by an attacker to do reconnaissance on a network?
Smurf attack
What is a session token?
a random string assigned by a web server
Which attack uses the user’s web browser settings to impersonate that user?
XSRF
John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing?
XSS
What is the basis of an SQL injection attack?
to insert SQL statements through unfiltered user input
Which attack intercepts communications between a web browser and the underlying computer?
man-in-the-browser (MITB)
What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another?
privilege escalation
Attackers who register domain names that are similar to legitimate domain names are performing _____.
URL hijacking
What type of attack intercepts legitimate communication and forges a fictitious response to the sender?
MITM
A replay attack _____.
makes a copy of the transmission for use at a later time
An attacker who manipulates the maximum size of an integer type would be performing what kind of attack?
integer overflow
Which of these is NOT a DoS attack?
push flood
What is the difference between a DoS and a DDoS attack?
DoS attacks use fewer computers than DDoS attacks
Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect?
Host table and external DNS server
DNS poisoning _____.
substitutes DNS addresses so that the computer is automatically redirected to another device
Why are extensions, plug-ins, and add-ons considered to be security risks?
They have introduced vulnerabilities in browsers.
Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks?
Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.
Which action cannot be performed through a successful SQL injection attack?
reformat the web application server’s hard drive
What type of attack involves manipulating third-party ad networks?
Malvertising
Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about?
Privilege escalation
Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser?
Plug-ins
How does network address translation (NAT) improve security?
It discards unsolicited packets.
Which statement regarding a demilitarized zone (DMZ) is NOT true?
It contains servers that are used only by internal network users.
Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose?
Split tunnel
Which device intercepts internal user requests and then processes those requests on behalf of the users?
Forward proxy server
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization’s secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?
A bridge could permit access to the secure wired network from the unsecured wireless network.
In which of the following configurations are all the load balancers always active?
Active-active
Which device watches for attacks and sounds an alert only when one occurs?
network intrusion detection system (NIDS)
Which of the following is a multipurpose security device?
Unified Threat Management (UTM)
Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian?
Cause the device to enter a fail-open mode
Which function does an Internet content filter NOT perform?
intrusion detection
Which of the following devices can identify the application that sends packets and then makes decisions about filtering based on it?
application-based firewall
Which of the following CANNOT be used to hide information about the internal network?
a protocol analyzer
Which statement about network address translation (NAT) is true?
It removes private addresses when the packet leaves the network.
Which device is easiest for an attacker to take advantage of to capture and analyze packets?
hub
Which of these would NOT be a filtering mechanism found in a firewall ACL rule?
data
Which of these is NOT used in scheduling a load balancer?
The IP address of the destination packet
Which is the most secure type of firewall?
stateful packet filtering
Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?
router
Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?
Once the MAC address table is full the switch functions like a network hub.
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
A NIPS can take actions more quickly to combat an attack.
Other Links:
See other websites for quiz:
Check on QUIZLETCheck on CHEGG