IS5403 Week 4 All Quizw

1.Both DNS poisoning and ARP poisoning involves:
Spoofing

2.Which of the following statements are true about client-side DNS? (Choose all that apply).
The Root Hints file has the IP addresses of the 13 root DNS servers
Check out DNS settings using the NSLookup command
Check out DNS settings using the DIG command
The cache.dns file has the IP addresses of the 13 root DNS servers

3.If an APIPA address is assigned, then DNS is the problem
Client-side DNS should be configured to point towards the DNS server that is authoritative for the domain that client wants to join
If a web site can be reached by IP address and not by host name, then DNS or the Hosts file would be the problem

4.A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The server has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?
IPCONFIG

5.Which command is used in testing and troubleshooting DNS servers?
nslookup

6.Which of the following are available protocols for security purposes? (Choose all that apply.)
TLS
SSH
IPSec
SSL

7.Which of the following services only requires a single port be opened on the firewall?
HTTP

8.SNMP uses which port by default?
161

9.To make a firewall effective you need to define/edit _______________
Firewall rules

10.Which of the following network profiles is available on Windows Firewall?
Domain networks
Home or work (private) networks
Public networks

11.What happens when you execute the following command:
Switch off Windows Firewall for all network profiles

12.Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?
It can prevent a DNS transfer attack.

13.Which of the following is NOT a service model in cloud computing?
Hardware as a Service (HaaS)

14.Which of these is the most secure protocol for transferring files?
SFTP

15.DNSSEC adds additional _____ and message header information, which can be used to verify that the requested data has not been altered in transmission.
resource records

16.Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?
Port mirroring

17.Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?
On-premises

18.Which of the following is NOT a security concern of virtualized environments?
Virtual servers are less expensive than their physical counterparts

19.Which of the following can be used to prevent a buffer overflow attack?
DEP

20.Which of these is NOT correct about an SSL/TLS accelerator?
It replaces FTP using Secure Sockets Layer (FTPS) as a file transport layer resting “on top” of SSL/TLS.

21.Which version of Simple Network Management Protocol (SNMP) is considered the most secure?
SNMPv3

22.Which type of device log contains the most beneficial security data?
firewall log

23.Which of the following TCP/IP protocols do not relate to security?
IP

24.Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?
DNS poisoning

25.Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?
successful logins

26.Which type of hypervisor does not run on an underlying operating system?
Type I

27.What functions of a switch does a software defined network separate?
Control plane and physical plane

28.Which type of cloud is offered to specific organizations that have common concerns?
community cloud

29.Which application stores the user’s desktop inside a virtual machine that resides on a server and is accessible from multiple locations?
VDI

30.Which type of log can provide details regarding requests for specific files on a system?
access log

31.What is the recommended secure protocol for voice and video applications?
Secure Real-time Transport Protocol (SRTP)

32.The primary design of a(n) _____ is to capture the transmissions from legitimate users.
evil twin

33.What is the primary weakness of wired equivalent privacy (WEP)?
Its usage creates a detectable pattern.

34.Which of these is a vulnerability of MAC address filtering?
MAC addresses are initially exchanged unencrypted.

35.Why is a rogue AP a security vulnerability?
It allows an attacker to bypass network security configurations.

36.Which technology is predominately used for contactless payment systems?
near field communication (NFC)

37.Which of these is NOT a type of wireless AP probe?
WNIC probe

38.Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?
PIN method

39.Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection?
Bluesnarfing

40.Which of the following is NOT true of a wireless router?
It is most commonly used in an enterprise setting .

50.Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?
RFID spectrum

51.Which of these is NOT a risk when a home wireless router is not securely configured?
Only a small percentage of the total traffic can be encrypted.

52.Which of these is NOT a limitation of turning off the SSID broadcast from an AP?
Users can more easily roam from one WLAN to another.

53.Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?
EAP-FAST

54.What is a difference between NFC and RFID?
RFID is designed for paper-based tags while NFC is not.

55.Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered?
captive portal

56.WPA replaces WEP with _____.
Temporal Key Integrity Protocol (TKIP)

57.A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase?
Controller AP

58.Which of the following is NOT a wireless peripheral protection option?
Install a network sensor to detect an attack

59.AES-CCMP is the encryption protocol standard used in _____.
WPA2

60.Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?
It is a framework for transporting authentication protocols

Other Links:

Statistics Quiz


Networking Quiz


See other websites for quiz:

Check on QUIZLET


Check on CHEGG






Leave a Reply

Your email address will not be published. Required fields are marked *