Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Border Routers can detect out-of-band communications such as GSM signals. True F

ID: 3707054 • Letter: B

Question

Border Routers can detect out-of-band communications such as GSM signals.

True

False

If I wanted to place an IDS on my network so that it could see the most amount of traffic, I would

  Place it right in front of the suspected compromised host.

Place it on any port of a local switch.

  Find the closest place to the gateway of my network and use a network tapping device.

  IDSs are not used for this role.

In most cases, which of the following methods would you NOT want to use with an IDS

SPAN port

Network Tap

Network Hub

An unconfigured switch port  

Defense in Depth includes all of the following EXCEPT:

Any combination of security devices, practices, and policies

A single, cost effective security appliance that is regularly maintained and updated

is layered like an onion

Cannot be accurately established until proper assessments have been conducted on the network.  

Your IDS generates an alert on a potential malicious download in progress. After reviewing the associated pcap in wireshark, you DO NOT observe a graceful tear down of the connection. Chances are the file transfer did not complete.

True

False

Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.

True

False

Deep Packet Inspection only looks at payload data.

True

False

Which one of these sessions would NOT be ideal for payload inspection?

HTTP GET request

Yahoo SMTP session

Amazon SSL connection

In HTTP web search

Host based security is not needed when you implement Defense in Depth.

True

False

If you implement too many security controls, what portion of the CIA triad (Information Assurance Pyramid) may suffer?

Availability

Confidentiality

  Integrity

  All of the above

This simulates the actions of a hypothetical attacker to attempt to compromise hosts.

Vulnerability assessment

  Penetration Test (PenTest)

Risk Assessment

All of the above.

How could a corporate user with an unauthorized Wireless USB CDMA adapter from Verizon create a backdoor into the network?

CDMA broadcasts in plaintext.

Since it is easy to do, an attacker is likely to hack the CDMA signal and intercept wireless packets.

This would not create a backdoor since they are two separate networks.

This would inadvertently create a network bridge that could allow access to content behind the business's security control

Practicing an Incident Response Policy is just as important as having one.

True

False

A network interface found in a promiscuous mode on an enterprise network would NOT be considered a possible symptom of system compromise.

True

False.

What is the Gold Disk?

Something The Beatles have too many of.

A desktop deployment standard with all of the same programs, services, and baseline features installed for continuity.

A set of server backups placed on a high capacity optical disk

A compilation of patches, fixes, and security controls that can be run on the host machine in order to advert network traffic congestion.

Host-Based monitoring will alert on all of the following except:

Changes to the system registry

Kernel changes

Zero-day browser exploits

falied login attempts

Explanation / Answer

Question :-Border Routers can detect out-of-band communications such as GSM signals.

Answer:---- True

Question :- If I wanted to place an IDS on my network so that it could see the most amount of traffic, I would

Answer:-- Place it on any port of a local switch.

Question :- In most cases, which of the following methods would you NOT want to use with an IDS

Answer:-- Network Hub

Question :- Defense in Depth includes all of the following EXCEPT:

Answer:-  A single, cost effective security appliance that is regularly maintained and updated.

Question :-Your IDS generates an alert on a potential malicious download in progress. After reviewing the associated pcap in wireshark, you DO NOT observe a graceful tear down of the connection. Chances are the file transfer did not complete.

Answer:-- False

Question :-  Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.

Answer:-- True

Question :-Deep Packet Inspection only looks at payload data.

Answer:-False

Question :- Which one of these sessions would NOT be ideal for payload inspection?

Answer:- In HTTP web search

Question :-Host based security is not needed when you implement Defense in Depth.

Answer:-- False

Question :- If you implement too many security controls, what portion of the CIA triad (Information Assurance Pyramid) may suffer?

Answer:-- All of above

Question :- This simulates the actions of a hypothetical attacker to attempt to compromise hosts.

Answer:-- Penetration Test (PenTest)

Question :---How could a corporate user with an unauthorized Wireless USB CDMA adapter from Verizon create a backdoor into the network?

Answer:-- This would inadvertently create a network bridge that could allow access to content behind the business's security control

Question:--Practicing an Incident Response Policy is just as important as having one.

Answer:-- True

Question:--A network interface found in a promiscuous mode on an enterprise network would NOT be considered a possible symptom of system compromise.

Answer:--False

Question:--What is the Gold Disk?

Answer:-- A compilation of patches, fixes, and security controls that can be run on the host machine in order to advert network traffic congestion.

Question:--Host-Based monitoring will alert on all of the following except:

Answer:--Changes to the system registry

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote