Shared Flashcard Set

Details

Exam 2 info sec
exam 2
61
Computer Networking
Undergraduate 4
11/11/2016

Additional Computer Networking Flashcards

 


 

Cards

Term

Which type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses or worms?

 

 

rootkit

 

backdoor

 

wrapper

 

shield

Definition
rootkit
Term

From the command prompt, the following command is issued: telnet  www.myserver.com  80. What process is being implemented for the purpose of information gathering?

 

 

HTML scanning

 

Xmas Tree port scanning

 

TCP SYN scanning

 

banner grabbing

Definition
banner grabbing
Term

The IEEE 802.15.1-2005 standard is based on which version of the Bluetooth specifications?

 

 

Bluetooth v2.1

 

Bluetooth v1.2

 

Bluetooth v1.0

 

Bluetooth v1.1

Definition

Bluetooth v1.2

 
Term

When using AES-CCMP encryption, the AES-256 bit key performs how many rounds?

 

 

4

 

10

 

13

 

15

Definition
13
Term

What type of malware is heavily dependent on  a user in order to spread?

 

 

worm

 

virus

 

infection

 

payload

Definition
virus
Term

A ___________ attack is similar to a passive man-in-the-middle attack.

 

 

replay

 

hijacking

 

denial of service

 

buffer overflow

Definition
replay
Term

An administrator is running a port scan. He wants to ensure that no processes are listening on port 23. What state should the port be in?

 

 

open

 

blocked

 

established

 

closed

Definition
closed
Term

Security is the goal to be free from danger as well as the process that achieves that freedom.

 

 

 

Definition
True
Term

Today's software attack tools do not require any sophisticated knowledge on the part of the attacker.

 

 

 

Definition
True
Term

Because a rootkit substitutes its own files and routines in the operating system, it can be difficult to detect the presence of a rootkit.

 

 

 

Definition
True
Term
An example of a(n) ___________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user's knowledge or permission.
Definition
vulnerability
Term
____________ provides tracking of events.
Definition
Accounting
Term
A type of threat that can come from employees, contractors and business partners such as a disgruntled worker is known as _______________.
Definition
Insiders
Term

As network administrator, you have been tasked with gaining a better understanding of who the attackers might be, why they might attack and what type of attacks might occur. Which of the following processes will you implement?

 

 

threat mitigation

 

threat profiling

 

risk modeling

 

threat modeling

Definition
threat modeling
Term

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

 

 

a rootkit

 

a macro

 

a program

 

a process

Definition
a macro
Term

A team of consultants has just completed the process of implementing a  VPN for your company. You have been assigned the task of evaluating the VPN implementation for proper setup and security. Your task is an example of:

 

 

VPN review

 

baseline review

 

design review

 

security review

Definition
design review
Term

What security goal do the following have in common: hashing, digital signatures, certificates and non-repudiation tools?

 

 

confidentiality

 

integrity

 

availability

 

safety

Definition
integrity
Term

Which type of system security malware allows for access to a computer, program or service without authorization?

 

 

botnet

 

zombie

 

backdoor

 

command and control

Definition
backdoor
Term

Which of the following encryption protocols is used in the WPA2 standard?

 

 

AES-CCMP

 

AES-CTR

 

AES-PAP

 

AES-SCMP

Definition
AES-CCMP
Term

A worm inserts malicious code into a program or data file, thereby spreading similarly to a virus.

 

 

 

Definition
false
Term

APs use antennas that radiate a signal in all directions.

 

 

 

Definition
true
Term
Analyzing code as it is written in order to prevent errors and increase security is referred to as:
Definition
code review
Term

According to the US Bureau of Labor Statistics, what percentage of growth is the available job outlook for information security analysts supposed to reach by the end of the decade?

 

 

10

 

15

 

22

 

27

Definition
22
Term

RADMIN is an example of port scanning software.

 

 

 

Definition
true
Term

Vulnerability scans are usually performed from outside the security perimeter.

 

 

 

Definition
false
Term
A ______________ is an in-depth examination and analysis of a wireless LAN site.
Definition
site survey
Term

 

When a wireless device looks for beacon frames it is known as ___________.

Definition
scanning
Term

What type of attack takes advantage of web applications that accept user input without validating it and then present it back to the user?

 

 

zero-day scripting

 

SQL injection

 

cross-site scripting

 

XML injection

Definition
cross-site scripting
Term

Which of the following protocols creates an encrypted channel between the client and the authentication server in addition to using Microsoft Windows logins and passwords?

 

 

TKIP

 

LEAP

 

PEAP

 

ICMP

Definition
PEAP
Term

What is the end result of a penetration test?

 

 

penetration test profile

 

penetration test report

 

penetration test system

 

penetration test view

Definition
penetration test report
Term

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:

 

 

session replay

 

session spoofing

 

session hijacking

 

session takeover

Definition
session hijacking
Term

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?

 

 

random

 

sanctioned

 

rogue

 

legitimate

Definition
rogue
Term

What is the maximum number of characters that can exit within an SSID?

 

 

10

 

12

 

26

 

32

Definition
32
Term

Which of the following SQL injection statements can be used to find specific users?

 

 

whatever' OR full_name = '%Mia%'

 

whatever' OR full_name IS '%Mia%'

 

whatever' OR full_name LIKE '%Mia%'

 

whatever' OR full_name equals '%Mia%'

Definition
whatever' OR full_name LIKE '%Mia%'
Term

Which of the following uses a standard web browser to provide information and gives the wireless user the opportunity to agree to a policy or present valid login credentials?

 

 

gateway access point

 

captive portal access point

 

wireless device probe

 

AUP enforcement access point

Definition
captive portal access point
Term

A security team has been hired to conduct a black box penetration test; thus, the tester has prior knowledge of the network infrastructure that is being tested. 

 

 

 

Definition
false
Term

Successful attacks on computers today consist of a single element, malicious software programs that are created to infiltrate computers with the intent to do harm.

 

 

 

Definition
false
Term

A healthy security posture results from a sound and workable strategy toward managing risks.

 

 

 

Definition
true
Term
On a piconet, slave devices that are connected but are not actively participating are called ______ slaves.
Definition
parked
Term

Of the three types of mutating malware, which type changes its internal code to one of a set number of predefined mutations whenever it is executed?

 

 

oligomorphic malware

 

polymorphic malware

 

metamorphic malware

 

statimorphic malware

Definition
oligomorphic malware
Term

A virus that infects an executable program file is known as:

 

 

macro virus

 

program virus

 

companion virus

 

boot sector virus

Definition
program virus
Term

Which type of attack is targeted against a smaller group of specific individuals such as the major executives working for a manufacturing company?

 

 

whaling

 

typo squatting

 

watering hole

 

vishing

Definition
watering hole
Term

EAP uses which of the following types of packets? (Choose three.)

 

 

request

 

response

 

success

 

error

Definition
a, b, c
Term

Because of the important role it plays, DNS can be the focus of attacks.

 

 

 

Definition
true
Term

XSS attacks occur when an attacker takes advantage of web applications that accept user input without validating it and then present it back to the user.

 

 

 

Definition
true
Term

An evil twin is an AP set up by an attacker to mimic an authorized AP with the intent to redirect client devices.

 

 

 

Definition
true
Term

If TCP port 53 is open, an attacker can assume that DNS is being used.

 

 

 

Definition
true
Term
In the ___________ technique, the virus splits the malicious code into several parts and the parts are placed at random positions throughout the program code.
Definition
split infection
Term
A ___________ box test is one in which some limited information has been provided to the tester.
Definition
gray
Term

Which of the following SQL injection statements can be used to discover the name of the table?

 

 

whatever%20 AND 1=(SELECT COUNT(*) FROM tabname);--

 

whatever' AND 1=(SELECT COUNT(*) FROM tabname);--

 

whatever; AND 1=(SELECT COUNT(*) FROM tabname);--

 

whatever%; AND 1=(SELECT COUNT(*) FROM tabname);--

Definition
Term

Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

 

 

whatever AND email IS NULL;--

 

whatever; AND email IS NULL;--

 

whatever" AND email IS NULL;--

 

whatever' AND email IS NULL;--

Definition
Term

Which of the following is responsible for the issuing of EAP request packets?

 

 

supplicant

 

authenticator

 

authentication server

 

proxy

Definition
authenticator
Term
The predecessor to today's Internet was a network known as ___________.
Definition
ARPAnet
Term

Which of the three protections ensures that only authorized parties can view information?

 

 

accounting

 

availability

 

integrity

 

confidentiality

Definition
confidentiality
Term

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.

 

 

EAP-MSCHAPv2

 

EAP-AKA

 

EAP-FAST

 

EAP-SIM

Definition
EAP-FAST
Term

Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small.

 

 

 

Definition
false
Term
Proper _____________ involves identifying risks but making the decision to not engage in the activity.
Definition
risk avoidance
Term
The ______________ reports directly to the chief information officer (CIO) and is responsible for assessing, managing and implementing security.
Definition
chief information security officer
Term
A __________________ can detect which ports are served and which ports are browsed for each individual system.
Definition
vulnerability scanner
Term

Because PEAP can be vulnerable to specific types of attacks, Cisco recommends that users migrate to a more secure EAP than PEAP.

 

 

 

Definition
Term

Bluetooth devices are not backwardly compatible with previous versions.

 

 

 

Definition
Supporting users have an ad free experience!