Deck 1: Network Security Fundamentals

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?

A) worm
B) macro
C) back door
D) Trojan
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which security layer verifies the identity of a user,service,or computer?

A) authentication
B) repudiation
C) physical security
D) authorization
سؤال
A worm creates files that copy themselves repeatedly and consume disk space.
سؤال
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

A) malicious port scanning
B) man-in-the-middle
C) denial of service
D) remote procedure call
سؤال
Which of the following is NOT one of the three primary goals of information security?

A) confidentiality
B) integrity
C) impartiality
D) availability
سؤال
What is a VPN typically used for?

A) secure remote access
B) detection of security threats
C) block open ports
D) filter harmful scripts
سؤال
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?

A) RPC attacks
B) ICMP message abuse
C) malicious port scanning
D) SYN flood
سؤال
In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

A) basic
B) challenge/response
C) biometrics
D) signature
سؤال
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?

A) firewall
B) recycle bin
C) quarantine
D) demilitarized zone
سؤال
Defense in depth can best be described as which of the following?

A) a firewall that protects the network and the servers
B) a layered approach to security
C) antivirus software and firewalls
D) authentication and encryption
سؤال
A hactivist can best be described as which of the following?

A) an unskilled programmer that spreads malicious scripts
B) consider themselves seekers of knowledge
C) use DoS attacks on Web sites with which they disagree
D) deface Web sites by leaving messages for their friends to read
سؤال
What can an attacker use a port scanner to test for on a target computer?

A) invalid IP addresses
B) SYN flags
C) open sockets
D) ping floods
سؤال
Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.
سؤال
With discretionary access control,network users can share information with other users,making it more risky than MAC.
سؤال
What is a program that appears to do something useful but is actually malware?

A) virus
B) logic bomb
C) Trojan
D) back door
سؤال
Physical security protects a system from theft,fire,or environmental disaster.
سؤال
Why might you want your security system to provide nonrepudiation?

A) to prevent a user from capturing packets and viewing sensitive information
B) to prevent an unauthorized user from logging into the system
C) to trace the origin of a worm spread through email
D) so a user can't deny sending or receiving a communication
سؤال
Which term is best described as an attack that relies on the gullibility of people?

A) malicious code
B) script kiddie
C) back door
D) social engineering
سؤال
A packet monkey is an unskilled programmer who spreads viruses and other malicious scripts to exploit computer weaknesses.
سؤال
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?

A) botnet
B) Trojan
C) logic bomb
D) packet monkey
سؤال
________________ events usually track the operations of the firewall or IDPS,making a log entry whenever it starts or shuts down.
سؤال
Which type of firewall policy calls for a firewall to deny all traffic by default?

A) permissive policy
B) perimeter policy
C) restrictive policy
D) demilitarized policy
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all,and normal traffic is blocked
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
The process of recording which computers are accessing a network and what resources are being accessed,and then recording the information in a log file
سؤال
Which of the following is NOT information that a packet filter uses to determine whether to block a packet?

A) checksum
B) port
C) IP address
D) protocol
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A method of authenticating a user using physical information,such as retinal scans,fingerprints,or voiceprints
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Signs of possible attacks that include an IP address,a port number,and the frequency of access attempts; an IDPS uses signatures to detect possible attacks
سؤال
__________________ are spread by several methods,including running executable code,sharing disks or memory sticks,opening e-mail attachments,and viewing infected or malicious Web pages.
سؤال
With which access control method do system administrators establish what information users can share?

A) discretionary access control
B) mandatory access control
C) administrative access control
D) role-based access control
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Hardware or software tools that allow or deny packets based on specified criteria,such as port,IP address,or protocol.
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Computer files that copy themselves repeatedly and consume disk space or other resources
سؤال
Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?

A) DiD
B) DMZ
C) VPN
D) IDPS
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An access control method that establishes organizational roles to control access to information
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An area in random access memory (RAM)reserved for the use of a program that "listens" for requests for the service it provides
سؤال
______________________ is the capability to prevent a participant in an electronic transaction from denying that it performed an action.
سؤال
______________ do not require user intervention to be launched; they are self-propagating.
سؤال
A ______________ is reserved for a program that runs in the background to listen for requests for the service it offers.
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A semitrusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN
سؤال
What tool do you use to secure remote access by users who utilize the Internet?

A) VPN
B) IDS
C) DMZ
D) DiD
سؤال
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A network connection consisting of a port number combined with a computer's IP address
سؤال
What is virus scanning and how does it work?
سؤال
What is a script kiddie?
سؤال
Discuss permissive versus restrictive firewall policies.
سؤال
Discuss defense in depth.
سؤال
What is malicious port scanning and how can you defend against it?
سؤال
List and describe two motivations attackers have to attack a network.
سؤال
Discuss scripting and how it relates to network security.
سؤال
Compare and contrast virus and worm.
سؤال
What is social engineering?
سؤال
What are the three primary goals of information security? Describe them.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Network Security Fundamentals
1
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?

A) worm
B) macro
C) back door
D) Trojan
B
2
Which security layer verifies the identity of a user,service,or computer?

A) authentication
B) repudiation
C) physical security
D) authorization
A
3
A worm creates files that copy themselves repeatedly and consume disk space.
True
4
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

A) malicious port scanning
B) man-in-the-middle
C) denial of service
D) remote procedure call
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT one of the three primary goals of information security?

A) confidentiality
B) integrity
C) impartiality
D) availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is a VPN typically used for?

A) secure remote access
B) detection of security threats
C) block open ports
D) filter harmful scripts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?

A) RPC attacks
B) ICMP message abuse
C) malicious port scanning
D) SYN flood
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

A) basic
B) challenge/response
C) biometrics
D) signature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?

A) firewall
B) recycle bin
C) quarantine
D) demilitarized zone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Defense in depth can best be described as which of the following?

A) a firewall that protects the network and the servers
B) a layered approach to security
C) antivirus software and firewalls
D) authentication and encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
A hactivist can best be described as which of the following?

A) an unskilled programmer that spreads malicious scripts
B) consider themselves seekers of knowledge
C) use DoS attacks on Web sites with which they disagree
D) deface Web sites by leaving messages for their friends to read
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
What can an attacker use a port scanner to test for on a target computer?

A) invalid IP addresses
B) SYN flags
C) open sockets
D) ping floods
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
With discretionary access control,network users can share information with other users,making it more risky than MAC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is a program that appears to do something useful but is actually malware?

A) virus
B) logic bomb
C) Trojan
D) back door
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Physical security protects a system from theft,fire,or environmental disaster.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Why might you want your security system to provide nonrepudiation?

A) to prevent a user from capturing packets and viewing sensitive information
B) to prevent an unauthorized user from logging into the system
C) to trace the origin of a worm spread through email
D) so a user can't deny sending or receiving a communication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which term is best described as an attack that relies on the gullibility of people?

A) malicious code
B) script kiddie
C) back door
D) social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
A packet monkey is an unskilled programmer who spreads viruses and other malicious scripts to exploit computer weaknesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?

A) botnet
B) Trojan
C) logic bomb
D) packet monkey
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
________________ events usually track the operations of the firewall or IDPS,making a log entry whenever it starts or shuts down.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which type of firewall policy calls for a firewall to deny all traffic by default?

A) permissive policy
B) perimeter policy
C) restrictive policy
D) demilitarized policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all,and normal traffic is blocked
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
The process of recording which computers are accessing a network and what resources are being accessed,and then recording the information in a log file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is NOT information that a packet filter uses to determine whether to block a packet?

A) checksum
B) port
C) IP address
D) protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A method of authenticating a user using physical information,such as retinal scans,fingerprints,or voiceprints
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Signs of possible attacks that include an IP address,a port number,and the frequency of access attempts; an IDPS uses signatures to detect possible attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
__________________ are spread by several methods,including running executable code,sharing disks or memory sticks,opening e-mail attachments,and viewing infected or malicious Web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
With which access control method do system administrators establish what information users can share?

A) discretionary access control
B) mandatory access control
C) administrative access control
D) role-based access control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Hardware or software tools that allow or deny packets based on specified criteria,such as port,IP address,or protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Computer files that copy themselves repeatedly and consume disk space or other resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?

A) DiD
B) DMZ
C) VPN
D) IDPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An access control method that establishes organizational roles to control access to information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An area in random access memory (RAM)reserved for the use of a program that "listens" for requests for the service it provides
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
______________________ is the capability to prevent a participant in an electronic transaction from denying that it performed an action.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
______________ do not require user intervention to be launched; they are self-propagating.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
A ______________ is reserved for a program that runs in the background to listen for requests for the service it offers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A semitrusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What tool do you use to secure remote access by users who utilize the Internet?

A) VPN
B) IDS
C) DMZ
D) DiD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A network connection consisting of a port number combined with a computer's IP address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is virus scanning and how does it work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is a script kiddie?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Discuss permissive versus restrictive firewall policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Discuss defense in depth.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is malicious port scanning and how can you defend against it?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
List and describe two motivations attackers have to attack a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Discuss scripting and how it relates to network security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Compare and contrast virus and worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is social engineering?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What are the three primary goals of information security? Describe them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.