Shared Flashcard Set

Details

1- Telecommunications (Chapter 8)
1- Telecommunications (Chapter 8)
45
Computer Networking
Undergraduate 3
10/23/2017

Additional Computer Networking Flashcards

 


 

Cards

Term
What process is a thorough examination of a network’s vulnerabilities that every organization should conduct to assess its security risks?
Definition
Posture assessment
Term
What can a company that is accredited by an agency that sets security standards perform for your network?
Definition
Security audit
Term
If you are examining a system to look for weaknesses that could lead to compromised information, what are you looking for?
Definition
Vulnerability
Term
A hacker has discovered a system vulnerability and proceeds to exploit it to gain access to the system. The vulnerability is not yet known to the developer so no fix is available. What type of attack is this?
Definition
Zero–day
Term
A user receives a fraudulent email claiming to need his user name and password to confirm his online bank account. What type of attack has been attempted?
Definition
Phishing
Term
An attacker uses an RF transmitter to flood the air waves with wireless traffic; what type of attack has occurred?
Definition
Jamming
Term
A flood of ping messages overwhelm a router interface in attempt to deny legitimate users access to a network. What type of attack is occurring?
Definition
DoS
Term
What type of policy does a new employee agree to which explains what they can and cannot do on the network?
Definition
Acceptable use
Term
What type of groups are centrally managed by Active Directory and provide a method for administrators to assign rights to users?
Definition
Domain local groups
Term
Which of the following employs a set of rules which determine the level and type of access granted to a device when it joins a network?
Definition
NAC
Term
When deploying NAC, what should you install on a system to get a one–time posture assessment of that system?
Definition
Nonpersistent agent
Term
In a NAC–protected network, where should a device that does not meet compliance requirements be placed?
Definition
Quarantine network
Term
A packet arrives on a router interface that has an ACL. The packet is examined and does not meet any of the ACL rules. What happens next?
Definition
The packet is denied
Term
Which statement allows ICMP packets from any address to a server with IP address 10.1.1.1?
Definition
access–list icmp_acl permit icmp any host 10.1.1.1
Term
What technique might an IDS use so that it can monitor all traffic carried by a switch?
Definition
Port mirroring
Term
Which of the following protects a network by monitoring traffic and creating alerts and is usually found in the DMZ?
Definition
NIDS
Term
Which type of device can detect threats to the network and can take preventive measures to prevent the threat from reaching its destination?
Definition
NIPS
Term
What type of firewall can inspect each packet to determine if it is part of a currently active connection?
Definition
Stateful
Term
What type of malware runs in the place of the computer’s normal system files when the computer starts?
Definition
Boot sector virus
Term
What type of malware can change its characteristics each time it is transferred to a new system?
Definition
Polymorphic virus
Term
Reason: Universally Connected Devices
Definition
Description: Attackers from anywhere in the world can send attacks.
Term
Reason: Increased Speed of Attacks
Definition
Description: Attackers can launch attacks against millions of computers within minutes.
Term
Reason: Greater sophistication of attacks.
Definition
Description: Attack tools vary their behavior so the same attack appears differently every time.
Term
Reason: Availability and Simplicity of Attack Tools
Definition
Description: Attacks no longer limited to highly skilled attackers.
Term
Reason: Delays security updating
Definition
Description: Vendors are overwhelmed trying to keep pace updating their products against the latest attacks.
Term
Reason: Weak Security Update Distribution
Definition
Description: Many software products lack a means to distribute security updates in a timely fashion.
Term
Reason: Distributed Attacks
Definition
Description: Attackers use thousands of computers in an attack against a single computer or network.
Term
Reason: User Confusion
Definition
Users are required to make difficult security decisions with little or no instruction.
Term
Layer: Products
Definition
Description: Forms the security around the data. May be as basic as door locks or as complicated as network security equipment.
Term
Layer: People
Definition
Description: Those who implement and properly use security products to protect data.
Term
Layer: Policies and Procedures
Definition
Description: Plans and policies established by an organization to ensure that people correctly use the products.
Term
Which of the choices provided would be considered a critical asset?
Definition
Information
Term
Why would system software not be considered a critical asset?
Definition
It can be recovered from a system partition. It can be purchased. It is easily replaced.
Term
The non-custom type of scan that is available with Windows Defender is a ____ scan.
Definition
Full
Term
Windows Defender uses alert levels to define potentially unwanted software on your computer. Which of these is NOT an actual level used by Windows Defender to choose how to respond to spyware and other unwanted software?
Definition
Critical
Term
True or False: Windows Defender does NOT report the date of its last system scan.
Definition
False
Term
What are three genuine Windows Defender alert item actions?
Definition
Default Action, Ignore, Remove
Term
What are NOT genuine Windows Defender alert item actions?
Definition
Move to Virus Vault, Quarantine
Term
Which of the choices provided is used to identify malware traits and characteristics?
Definition
Concealment
Term
Your office requires badge keys for access. Holding the door for a third party who rushes up quickly behind you is a form of ________ engineering.
Definition
Social
Term
Which control panel category is used to access Windows Firewall?
Definition
System and Security
Term
When viewing the firewall settings for the first time, how is the firewall treating incoming connections that are on the list of allowed programs?
Definition
Blocked
Term
At which layer of the OSI model do packet filtering firewalls operate?
Definition
Network
Term
In its final configured state, what action will be taken on Remote Desktop connection while the computer is on a public network?
Definition
Blocked
Term
In its final configured state, what action will be taken on Remote Desktop connection while the computer is on a private network?
Definition
Permitted
Supporting users have an ad free experience!