What policy does the textbook author suggest for leaving


1. Which of the following is an application-based attack?
ICMP flood

SYN flood

SQL injection

Distributed reflection denial of service

Question 2.
2. According to the video in Week 1, what are the typical steps used to compromise an organization?
Attack, scanning, footprinting, and enumeration

Footprinting, scanning, enumeration, and attack

Scanning, enumeration, attack, and footprinting

Footprinting, attack, scanning, and enumeration

Question 3.
3. Which network design is usually used to separate and protect private from public network resources?
Hardware and software firewalls

Patch management

DMZ

Stateful packet inspection

Question 4.
4. Three techniques that should be part of every network design include which of the following?
Packet filter, bastion host, circuit level firewalls

DMZs, Proxy servers, NAT

Firestarter, Norton personal firewall, outpost personal firewall

IP spoofing, SYN floods, ping floods

Question 5.
5. Which is not a consideration for which kind of firewall that should be implemented?
Size of network

Need to connect multiple LANs into a single WAN

Skill of administrator

Cost vs. benefit

Question 6.
6. Which firewall solution would be best for a home business, running Windows OS Professional, with minimal confidential data?
Client-Proxy-Destination service

Destination service-Client-Proxy

Proxy-Client-Destination Service

Proxy-Destination Service-Client

Question 7.
7. If an intrusion-detection system detects a series of ICMP packets sent to each port, from the same IP address, it might indicate
distributed denial of service attack in progress.

scanning of the system for vulnerabilities prior to an attack.

the system has been infiltrated by an outsider.

Trojan horse virus infection sending information back home.

Question 8.
8. A fake system that can be used as bait for attackers to attempt to break into is known as
intrusion deflection.

anomaly detection.

executable profiling.

Honeypot.

Question 9.
9. Which of these technologies is a combination of an encryption algorithm and a hash?
Digital signature

RSA

Conventional encryption

PGP

Question 10.
10. Which of the following statements is a weakness of symmetric encryption?
Modern math processors can break it quickly.

It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.

Because the key must be transmitted, the scheme is only as secure as your transport method.

Throughput is minimal, making it a poor choice for large files. For example, symmetric key encryption has no weaknesses.

Question 11.
11. At what layer of the OSI model does PPTP work?
Layer 1

Layer 2

Layer 3

Layers 2 and 3

Question 12.
12. What does L2TP stand for?
level 2 transfer protocol

layer 2 transfer protocol

layer 2 tunneling protocol

level 2 transfer protocol

Question 13.
13. Which Trojan horse is a small, self-installing remote administration system, which permits a user to control the infected system across a TCP/IP connection?
Back Orifice

Dropper

NetBus

Spybot

Question 14.
14. Which of the following is the most common method by which viruses spread?
By reading the e-mail address book and mailing itself to everyone listed

By broadcasting ICMP packets and following network connections

By accessing the web application and cloning sent mail

By users downloading and installing unauthorized files from the Web

Question 15.
15. Which of the following steps should be taken to lessen hacker threats from Windows default accounts?
Default administrator account should be deleted and the default user account should be given administrator privileges.

Default accounts should be deleted or disabled and a new account should be created with administrative privileges.

Default administrator and user accounts should be deleted.

All default accounts should be deleted or disabled.

Question 16.
16. Which of the following security templates are included in Windows servers?
HIsecdc, Hisecws, Websec, IPSec

DC security Securews, Rootsec, Supersec

Rootsec, Supersec Websec, IPSec

DC security, HIsecdc, Hisecws, Securews

Question 17.
17. Why does the textbook author state that technology alone is not a panacea for network security problems?
Advances in technology occur too rapidly for security pros to keep up with them.

Improvements in technology actually create the most security problems.

Technology cannot be effective if people do not follow appropriate procedures.

The author actually does say that technology solves network security problems.

Question 18.
18. What policy does the textbook author suggest for leaving employees?
Disable all accounts, e-mail, wireless, and cell phones

Tell their new employer about any security issues

Update their Facebook and LinkedIn account status

Have them sign a non-disclosure agreement

Question 19.
19. Which of the following is the first step in assessing a system?
Threat identification

System characterization

Control analysis

Likelihood determination

Question 20.
20. Which of the following is one reason to use a packet sniffer?
Cyber terrorism

Check for attached mass storage devices

Digital forensics of a hard drive

Establishing a baseline of network activity

Solution Preview :

Prepared by a verified Expert
Computer Engineering: What policy does the textbook author suggest for leaving
Reference No:- TGS02516884

Now Priced at $10 (50% Discount)

Recommended (92%)

Rated (4.4/5)