WAN Q4

Card Set Information

Author:
kirin
ID:
167247
Filename:
WAN Q4
Updated:
2012-08-24 04:03:51
Tags:
WAN Quiz
Folders:

Description:
Wide Area Network Quiz 4 - Network Security
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user kirin on FreezingBlue Flashcards. What would you like to do?


  1. Which of the following individuals is considered a "good guy"?

    A) White hat
    B) Phreaker
    C) Black hat
    D) Cracker
    A) White hat
    (this multiple choice question has been scrambled)
  2. Which of the following describes an Open Network?

    a) Easy to configure and administer
    b) Easy for end users to access network resources
    c) Security cost: least expensive
    d) All of the above
    d) All of the above
  3. What is vulnerability?

    A) The expressed potential for the occurrence of a harmful event such as an attack
    B) An action taken against a target with the intention of doing harm
    C) An action, device or event that threaten the integrity and security of data and information stored within
    D) The degree of weakness which is inherent in every network and device
    D) The degree of weakness which is inherent in every network and device
    (this multiple choice question has been scrambled)
  4. Match the term to the associated description.

    Description:
    operating system weaknesses
    unsecured user accounts
    network equipment weaknesses
    unsecured default settings
    politics
    TCP/IP weaknesses
    lack of disaster recovery plan 

    Term:
    Security Policy Weakness
    Technology Weaknesses 
    Configuration Weaknesses
    • operating system weaknesses => Technology Weaknesses
    • unsecured user accounts => Configuration Weaknesses
    • network equipment weaknesses => Technology Weaknesses
    • unsecured default settings => Configuration Weaknesses
    • politics => Security Policy Weakness
    • TCP/IP weaknesses => Technology Weaknesses
    • lack of disaster recovery plan => Security Policy Weakness
  5. Match the mitigation actions with the associated threats.

    Threats:
    Use security cameras
    Humidity control
    Install UPS systems
    Use neat cable runs

    Mitigation Actions:
    Hardware threats
    Environmental threats
    Electrical threats
    Maintenance threats
    • Use security cameras => Hardware threats
    • Humidity control => Environmental threats
    • Install UPS systems => Electrical threats
    • Use neat cable runs => Maintenance threats
  6. Match the term to the associated description.

    Term:
    Reconnaissance attack
    Password attack
    Worms, virus, Trojan horse
    DoS attack

    Description:
    dictionary cracking and brute force attack
    using ping sweep, port scans, and packet sniffers to gain information about a network
    flooding a network device with traffic in an attempt to render it unusable for legitimate traffic
    malicious software designed to damage a system, replicate itself, or deny services or access to networks, systems, or services
    • Reconnaissance attack => using ping sweep, port scans, and packet sniffers to gain information about a network
    • Password attack => dictionary cracking and brute force attack
    • Worms, virus, Trojan horse => malicious software designed to damage a system, replicate itself, or deny services or access to networks, systems, or services
    • DoS attack =>  flooding a network device with traffic in an attempt to render it unusable for legitimate traffic
  7. What is the function of an IDS?

    A) Protect against known viruses
    B) Protect personal computers from attacks
    C) Prevent attacks against the network
    D) Detect attacks against a network and send logs to a management console.
    D) Detect attacks against a network and send logs to a management console.
    (this multiple choice question has been scrambled)
  8. Which of the following must be configured first before configuring SSH on VTY lines? (Choose 2)

    a) domain name
    b) access control lists
    c) hostname
    d) MOTD banner
    • a) domain name    
    • c) hostname
  9. Which protocol should be used when strong privacy and session integrity are needed for remote router administration?

    A) HTTPS
    B) SSL
    C) Telnet
    D) Secure FTP
    E) SSH
    E) SSH
    (this multiple choice question has been scrambled)
  10. What is the configuration register setting that will cause the router to bypass the startup configuration?

    A) 0x2132
    B) 0x2192
    C) 0x2102
    D) 0x2142
    D) 0x2142
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview