Term
| What process is a thorough examination of a network’s vulnerabilities that every organization should conduct to assess its security risks? |
|
Definition
|
|
Term
| What can a company that is accredited by an agency that sets security standards perform for your network? |
|
Definition
|
|
Term
| If you are examining a system to look for weaknesses that could lead to compromised information, what are you looking for? |
|
Definition
|
|
Term
| A hacker has discovered a system vulnerability and proceeds to exploit it to gain access to the system. The vulnerability is not yet known to the developer so no fix is available. What type of attack is this? |
|
Definition
|
|
Term
| A user receives a fraudulent email claiming to need his user name and password to confirm his online bank account. What type of attack has been attempted? |
|
Definition
|
|
Term
| An attacker uses an RF transmitter to flood the air waves with wireless traffic; what type of attack has occurred? |
|
Definition
|
|
Term
| A flood of ping messages overwhelm a router interface in attempt to deny legitimate users access to a network. What type of attack is occurring? |
|
Definition
|
|
Term
| What type of policy does a new employee agree to which explains what they can and cannot do on the network? |
|
Definition
|
|
Term
| What type of groups are centrally managed by Active Directory and provide a method for administrators to assign rights to users? |
|
Definition
|
|
Term
| Which of the following employs a set of rules which determine the level and type of access granted to a device when it joins a network? |
|
Definition
|
|
Term
| When deploying NAC, what should you install on a system to get a one–time posture assessment of that system? |
|
Definition
|
|
Term
| In a NAC–protected network, where should a device that does not meet compliance requirements be placed? |
|
Definition
|
|
Term
| A packet arrives on a router interface that has an ACL. The packet is examined and does not meet any of the ACL rules. What happens next? |
|
Definition
|
|
Term
| Which statement allows ICMP packets from any address to a server with IP address 10.1.1.1? |
|
Definition
| access–list icmp_acl permit icmp any host 10.1.1.1 |
|
|
Term
| What technique might an IDS use so that it can monitor all traffic carried by a switch? |
|
Definition
|
|
Term
| Which of the following protects a network by monitoring traffic and creating alerts and is usually found in the DMZ? |
|
Definition
|
|
Term
| Which type of device can detect threats to the network and can take preventive measures to prevent the threat from reaching its destination? |
|
Definition
|
|
Term
| What type of firewall can inspect each packet to determine if it is part of a currently active connection? |
|
Definition
|
|
Term
| What type of malware runs in the place of the computer’s normal system files when the computer starts? |
|
Definition
|
|
Term
| What type of malware can change its characteristics each time it is transferred to a new system? |
|
Definition
|
|
Term
| Reason: Universally Connected Devices |
|
Definition
| Description: Attackers from anywhere in the world can send attacks. |
|
|
Term
| Reason: Increased Speed of Attacks |
|
Definition
| Description: Attackers can launch attacks against millions of computers within minutes. |
|
|
Term
| Reason: Greater sophistication of attacks. |
|
Definition
| Description: Attack tools vary their behavior so the same attack appears differently every time. |
|
|
Term
| Reason: Availability and Simplicity of Attack Tools |
|
Definition
| Description: Attacks no longer limited to highly skilled attackers. |
|
|
Term
| Reason: Delays security updating |
|
Definition
| Description: Vendors are overwhelmed trying to keep pace updating their products against the latest attacks. |
|
|
Term
| Reason: Weak Security Update Distribution |
|
Definition
| Description: Many software products lack a means to distribute security updates in a timely fashion. |
|
|
Term
| Reason: Distributed Attacks |
|
Definition
| Description: Attackers use thousands of computers in an attack against a single computer or network. |
|
|
Term
|
Definition
| Users are required to make difficult security decisions with little or no instruction. |
|
|
Term
|
Definition
| Description: Forms the security around the data. May be as basic as door locks or as complicated as network security equipment. |
|
|
Term
|
Definition
| Description: Those who implement and properly use security products to protect data. |
|
|
Term
| Layer: Policies and Procedures |
|
Definition
| Description: Plans and policies established by an organization to ensure that people correctly use the products. |
|
|
Term
| Which of the choices provided would be considered a critical asset? |
|
Definition
|
|
Term
| Why would system software not be considered a critical asset? |
|
Definition
| It can be recovered from a system partition. It can be purchased. It is easily replaced. |
|
|
Term
| The non-custom type of scan that is available with Windows Defender is a ____ scan. |
|
Definition
|
|
Term
| Windows Defender uses alert levels to define potentially unwanted software on your computer. Which of these is NOT an actual level used by Windows Defender to choose how to respond to spyware and other unwanted software? |
|
Definition
|
|
Term
| True or False: Windows Defender does NOT report the date of its last system scan. |
|
Definition
|
|
Term
| What are three genuine Windows Defender alert item actions? |
|
Definition
| Default Action, Ignore, Remove |
|
|
Term
| What are NOT genuine Windows Defender alert item actions? |
|
Definition
| Move to Virus Vault, Quarantine |
|
|
Term
| Which of the choices provided is used to identify malware traits and characteristics? |
|
Definition
|
|
Term
| Your office requires badge keys for access. Holding the door for a third party who rushes up quickly behind you is a form of ________ engineering. |
|
Definition
|
|
Term
| Which control panel category is used to access Windows Firewall? |
|
Definition
|
|
Term
| When viewing the firewall settings for the first time, how is the firewall treating incoming connections that are on the list of allowed programs? |
|
Definition
|
|
Term
| At which layer of the OSI model do packet filtering firewalls operate? |
|
Definition
|
|
Term
| In its final configured state, what action will be taken on Remote Desktop connection while the computer is on a public network? |
|
Definition
|
|
Term
| In its final configured state, what action will be taken on Remote Desktop connection while the computer is on a private network? |
|
Definition
|
|