Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. (TCO 1) Which of the following is an application-based attack? (Points : 5) I

ID: 3551264 • Letter: 1

Question

1. (TCO 1) Which of the following is an application-based attack? (Points : 5)        ICMP flood
       SYN flood
       SQL injection
       Distributed Reflection Denial of Service

Question 2.2. (TCO 1) One of the most common types of attacks against commercial websites via the Internet is: (Points : 5)        Buffer overflow
       Denial of service
       IP spoofing
       Session hacking

Question 3.3. (TCO 2) Which type of software firewall is included in Windows XP and many distributions of Linux operating systems? (Points : 5)        Application proxy
       Packet filter
       Stateful packet inspection
       User authentication

Question 4.4. (TCO 2) Three techniques that should be part of every network design include which of the following? (Points : 5)        Packet filter, bastion host, circuit level firewalls
       DMZs, Proxy servers, NAT
       Firestarter, Norton personal firewall, Outpost personal firewall
       IP spoofing, SYN floods, Ping floods

Question 5.5. (TCO 3) What is the proper connection chain for an application proxy? (Points : 5)        Client - Proxy - Destination service
       Destination service - Client - Proxy
       Proxy - Client - Destination service
       Proxy - Destination service - Client

Question 6.6. (TCO 3) Which is NOT a consideration for which kind of firewall that should be implemented? (Points : 5)        Size of network
       Need to connect multiple LANs into a single WAN
       Skill of administrator
       Cost vs. benefit

Question 7.7. (TCO 4) Attempts by an intruder to determine information about a system, prior to the start of an intrusion attack, is called _____. (Points : 5)        deflecting
       detecting
       footprinting
       infiltration

Question 8.8. (TCO 4) If an intrusion-detection system detects a series of ICMP packets sent to each port, from the same IP address, it might indicate _____. (Points : 5)        Distributed Denial of Service attack in progress
       scanning of the system for vulnerabilities prior to an attack
       the system has been infiltrated by an outsider
       Trojan Horse/virus infection sending information back home

Question 9.9. (TCO 5) Which of the following is a password cracking tool? (Points : 5)        POTUS
       SATAN
       SNORT
       John the Ripper

Question 10.10. (TCO 5) Which of these technologies is a combination of an encryption algorithm and a hash? (Points : 5)        Digital signature
       RSA
       Conventional Encryption
       PGP

Question 11.11. (TCO 6) What does L2TP stand for? (Points : 5)        level 2 transfer protocol
       layer 2 transfer protocol
       layer 2 tunneling protocol
       level 2 transfer protocol

Question 12.12. (TCO 6) Which protocols compromise IPSEC? (Points : 5)        ESP, IPComp, AH, IKE
       Tunnel, Transport, IETF, MPPE
       IPComp, AH, IETF, MPPE
       AH, ESP, Tunnel, Transport

Question 13.13. (TCO 7) Which of the following is a possible result of a Trojan horse infection? (Points : 5)        installing front doors and executing XML attacks
       installing back doors to allow access to the system
       installing IRC for email relays
       using as a proxy for searching for google hacks

Question 14.14. (TCO 7) Which Trojan horse is a small, self-installing remote administration system, which permits a user to control the infected system across a TCP/IP connection?(Points : 5)        Back Orifice
       Dropper
       NetBus
       Spybot

Question 15.15. (TCO 8) What Windows account types are most attractive to attackers? (Points : 5)        Administrators, IUSR, ASP.NET, Database accounts
       Guests, Dead users, Default users, Backdoors
       Root, apache, sysadam, SU
       DC security, HIsecdc, Hisecws, Securews

Question 16.16. (TCO 8) Which of the following would NOT be a default account on a Windows machine? (Points : 5)        ASP.NET
       Administrator
       IUSR_machine name
       username

Question 17.17. (TCO 9) Which of the following is the standard consequence escalation sequence for many companies? (Points : 5)        Written warning - Verbal warning - Suspension/termination
       Suspension/termination - Verbal warning - Written warning
       Verbal warning - Suspension/termination - Written warning
       Verbal warning - Written warning - Suspension/termination

Question 18.18. (TCO 9) Regarding security, which of the following areas of user activities should be covered in policies? (Points : 5)        Lunch breaks, personal hygiene, printer use
       Passwords, e-mail attachments, instant messaging
       Internet use, Lunch breaks, time tracking
       Telecommunications, VOIP, internet use

Question 19.19. (TCO 10) Which patch management system looks for "rogue" devices? (Points : 5)        Patchlink
       HFNetChkPro
       Zen Works Patch Management

       McAfee ePolicy Orchestrator

Question 20.20. (TCO 10) Which of the following is one reason to use a packet sniffer? (Points : 5)        Cyber terrorism
       Check for attached mass storage devices
       Digital forensics of a hard drive
       Establishing a baseline of network activity 1. (TCO 1) Which of the following is an application-based attack? (Points : 5)        ICMP flood
       SYN flood
       SQL injection
       Distributed Reflection Denial of Service

Explanation / Answer

Q1. SQL injection

Q2.Denial of service

Q3.Packet filter


Q4.IP spoofing, SYN floods, Ping floods


Q5.Client - Proxy - Destination service


Q6.Cost vs. benefit


Q7. infiltration


Q8.Distributed Denial of Service attack in progress


Q9.John the Ripper


Q10.PGP


Q11. layer 2 tunneling protocol


Q12. AH, ESP, Tunnel, Transport


Q13. installing back doors to allow access to the system


Q14.netbus


Q15.Administrators, IUSR, ASP.NET, Database accounts


Q16.ASP.NET


Q17.

Verbal warning - Written warning - Suspension/termination


Q18.

Telecommunications, VOIP, internet use


Q19. McAfee ePolicy Orchestrator


Q20. Establishing a baseline of network activity