Border Routers can detect out-of-band communications such as GSM signals. True F
ID: 3707054 • Letter: B
Question
Border Routers can detect out-of-band communications such as GSM signals.
True
False
If I wanted to place an IDS on my network so that it could see the most amount of traffic, I would
Place it right in front of the suspected compromised host.
Place it on any port of a local switch.
Find the closest place to the gateway of my network and use a network tapping device.
IDSs are not used for this role.
In most cases, which of the following methods would you NOT want to use with an IDS
SPAN port
Network Tap
Network Hub
An unconfigured switch port
Defense in Depth includes all of the following EXCEPT:
Any combination of security devices, practices, and policies
A single, cost effective security appliance that is regularly maintained and updated
is layered like an onion
Cannot be accurately established until proper assessments have been conducted on the network.
Your IDS generates an alert on a potential malicious download in progress. After reviewing the associated pcap in wireshark, you DO NOT observe a graceful tear down of the connection. Chances are the file transfer did not complete.
True
False
Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.
True
False
Deep Packet Inspection only looks at payload data.
True
False
Which one of these sessions would NOT be ideal for payload inspection?
HTTP GET request
Yahoo SMTP session
Amazon SSL connection
In HTTP web search
Host based security is not needed when you implement Defense in Depth.
True
False
If you implement too many security controls, what portion of the CIA triad (Information Assurance Pyramid) may suffer?
Availability
Confidentiality
Integrity
All of the above
This simulates the actions of a hypothetical attacker to attempt to compromise hosts.
Vulnerability assessment
Penetration Test (PenTest)
Risk Assessment
All of the above.
How could a corporate user with an unauthorized Wireless USB CDMA adapter from Verizon create a backdoor into the network?
CDMA broadcasts in plaintext.
Since it is easy to do, an attacker is likely to hack the CDMA signal and intercept wireless packets.
This would not create a backdoor since they are two separate networks.
This would inadvertently create a network bridge that could allow access to content behind the business's security control
Practicing an Incident Response Policy is just as important as having one.
True
False
A network interface found in a promiscuous mode on an enterprise network would NOT be considered a possible symptom of system compromise.
True
False.
What is the Gold Disk?
Something The Beatles have too many of.
A desktop deployment standard with all of the same programs, services, and baseline features installed for continuity.
A set of server backups placed on a high capacity optical disk
A compilation of patches, fixes, and security controls that can be run on the host machine in order to advert network traffic congestion.
Host-Based monitoring will alert on all of the following except:
Changes to the system registry
Kernel changes
Zero-day browser exploits
falied login attempts
Explanation / Answer
Question :-Border Routers can detect out-of-band communications such as GSM signals.
Answer:---- True
Question :- If I wanted to place an IDS on my network so that it could see the most amount of traffic, I would
Answer:-- Place it on any port of a local switch.
Question :- In most cases, which of the following methods would you NOT want to use with an IDS
Answer:-- Network Hub
Question :- Defense in Depth includes all of the following EXCEPT:
Answer:- A single, cost effective security appliance that is regularly maintained and updated.
Question :-Your IDS generates an alert on a potential malicious download in progress. After reviewing the associated pcap in wireshark, you DO NOT observe a graceful tear down of the connection. Chances are the file transfer did not complete.
Answer:-- False
Question :- Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.
Answer:-- True
Question :-Deep Packet Inspection only looks at payload data.
Answer:-False
Question :- Which one of these sessions would NOT be ideal for payload inspection?
Answer:- In HTTP web search
Question :-Host based security is not needed when you implement Defense in Depth.
Answer:-- False
Question :- If you implement too many security controls, what portion of the CIA triad (Information Assurance Pyramid) may suffer?
Answer:-- All of above
Question :- This simulates the actions of a hypothetical attacker to attempt to compromise hosts.
Answer:-- Penetration Test (PenTest)
Question :---How could a corporate user with an unauthorized Wireless USB CDMA adapter from Verizon create a backdoor into the network?
Answer:-- This would inadvertently create a network bridge that could allow access to content behind the business's security control
Question:--Practicing an Incident Response Policy is just as important as having one.
Answer:-- True
Question:--A network interface found in a promiscuous mode on an enterprise network would NOT be considered a possible symptom of system compromise.
Answer:--False
Question:--What is the Gold Disk?
Answer:-- A compilation of patches, fixes, and security controls that can be run on the host machine in order to advert network traffic congestion.
Question:--Host-Based monitoring will alert on all of the following except:
Answer:--Changes to the system registry
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.