1. (TCO 1) Which of the following is an application-based attack? (Points : 5) I
ID: 3551264 • Letter: 1
Question
1. (TCO 1) Which of the following is an application-based attack? (Points : 5) ICMP floodSYN flood
SQL injection
Distributed Reflection Denial of Service
Question 2.2. (TCO 1) One of the most common types of attacks against commercial websites via the Internet is: (Points : 5) Buffer overflow
Denial of service
IP spoofing
Session hacking
Question 3.3. (TCO 2) Which type of software firewall is included in Windows XP and many distributions of Linux operating systems? (Points : 5) Application proxy
Packet filter
Stateful packet inspection
User authentication
Question 4.4. (TCO 2) Three techniques that should be part of every network design include which of the following? (Points : 5) Packet filter, bastion host, circuit level firewalls
DMZs, Proxy servers, NAT
Firestarter, Norton personal firewall, Outpost personal firewall
IP spoofing, SYN floods, Ping floods
Question 5.5. (TCO 3) What is the proper connection chain for an application proxy? (Points : 5) Client - Proxy - Destination service
Destination service - Client - Proxy
Proxy - Client - Destination service
Proxy - Destination service - Client
Question 6.6. (TCO 3) Which is NOT a consideration for which kind of firewall that should be implemented? (Points : 5) Size of network
Need to connect multiple LANs into a single WAN
Skill of administrator
Cost vs. benefit
Question 7.7. (TCO 4) Attempts by an intruder to determine information about a system, prior to the start of an intrusion attack, is called _____. (Points : 5) deflecting
detecting
footprinting
infiltration
Question 8.8. (TCO 4) If an intrusion-detection system detects a series of ICMP packets sent to each port, from the same IP address, it might indicate _____. (Points : 5) Distributed Denial of Service attack in progress
scanning of the system for vulnerabilities prior to an attack
the system has been infiltrated by an outsider
Trojan Horse/virus infection sending information back home
Question 9.9. (TCO 5) Which of the following is a password cracking tool? (Points : 5) POTUS
SATAN
SNORT
John the Ripper
Question 10.10. (TCO 5) Which of these technologies is a combination of an encryption algorithm and a hash? (Points : 5) Digital signature
RSA
Conventional Encryption
PGP
Question 11.11. (TCO 6) What does L2TP stand for? (Points : 5) level 2 transfer protocol
layer 2 transfer protocol
layer 2 tunneling protocol
level 2 transfer protocol
Question 12.12. (TCO 6) Which protocols compromise IPSEC? (Points : 5) ESP, IPComp, AH, IKE
Tunnel, Transport, IETF, MPPE
IPComp, AH, IETF, MPPE
AH, ESP, Tunnel, Transport
Question 13.13. (TCO 7) Which of the following is a possible result of a Trojan horse infection? (Points : 5) installing front doors and executing XML attacks
installing back doors to allow access to the system
installing IRC for email relays
using as a proxy for searching for google hacks
Question 14.14. (TCO 7) Which Trojan horse is a small, self-installing remote administration system, which permits a user to control the infected system across a TCP/IP connection?(Points : 5) Back Orifice
Dropper
NetBus
Spybot
Question 15.15. (TCO 8) What Windows account types are most attractive to attackers? (Points : 5) Administrators, IUSR, ASP.NET, Database accounts
Guests, Dead users, Default users, Backdoors
Root, apache, sysadam, SU
DC security, HIsecdc, Hisecws, Securews
Question 16.16. (TCO 8) Which of the following would NOT be a default account on a Windows machine? (Points : 5) ASP.NET
Administrator
IUSR_machine name
username
Question 17.17. (TCO 9) Which of the following is the standard consequence escalation sequence for many companies? (Points : 5) Written warning - Verbal warning - Suspension/termination
Suspension/termination - Verbal warning - Written warning
Verbal warning - Suspension/termination - Written warning
Verbal warning - Written warning - Suspension/termination
Question 18.18. (TCO 9) Regarding security, which of the following areas of user activities should be covered in policies? (Points : 5) Lunch breaks, personal hygiene, printer use
Passwords, e-mail attachments, instant messaging
Internet use, Lunch breaks, time tracking
Telecommunications, VOIP, internet use
Question 19.19. (TCO 10) Which patch management system looks for "rogue" devices? (Points : 5) Patchlink
HFNetChkPro
Zen Works Patch Management
McAfee ePolicy Orchestrator
Question 20.20. (TCO 10) Which of the following is one reason to use a packet sniffer? (Points : 5) Cyber terrorism
Check for attached mass storage devices
Digital forensics of a hard drive
Establishing a baseline of network activity 1. (TCO 1) Which of the following is an application-based attack? (Points : 5) ICMP flood
SYN flood
SQL injection
Distributed Reflection Denial of Service
Explanation / Answer
Q1. SQL injection
Q2.Denial of service
Q3.Packet filter
Q4.IP spoofing, SYN floods, Ping floods
Q5.Client - Proxy - Destination service
Q6.Cost vs. benefit
Q7. infiltration
Q8.Distributed Denial of Service attack in progress
Q9.John the Ripper
Q10.PGP
Q11. layer 2 tunneling protocol
Q12. AH, ESP, Tunnel, Transport
Q13. installing back doors to allow access to the system
Q14.netbus
Q15.Administrators, IUSR, ASP.NET, Database accounts
Q16.ASP.NET
Q17.
Verbal warning - Written warning - Suspension/termination
Q18.
Telecommunications, VOIP, internet use
Q19. McAfee ePolicy Orchestrator
Q20. Establishing a baseline of network activity
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.