Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
1. What can you detect by analyzing a data packet?
|
1. Policy violations and network vulnerabilities
N/A |
|
2. Which of the following is true about Net Witness investigator?
|
2. Analyzes static and real-time data.
N/A |
|
3. What is used by TCP to establish a session between two systems?
|
3. Three-way Handshake
Ch. 2, 69 Ch 4, 121 |
|
4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?
|
4. TCP
Ch. 2, 65,69 |
|
5. Promiscuous mode is most commonly associated with which of the following?
|
5. A network interface.
N/A |
|
6. Which of the following is NOT a primary objective of information security?
|
6. Privacy
Ch. 1, 6 |
|
7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of which of the following?
|
7. Policy
Ch 1, 9 |
|
8. Which security group is responsible for managing network vulnerabilities and threats?
|
8. IT security staff
Ch. 1,12 |
|
9. Which network component filters traffic between nodes?
|
9. Firewall
Ch2, 44 |
|
10. Which is the most important consideration when designing a network?
|
10. Ability to meet business needs.
Ch1, 10 |
|
11. What is usually the first activity in the hacking process?
|
11. Reconnaissance
Ch4,119 |
|
12. Which of the following might a hacker offer as a service?
|
12. DoS attack, spam distribution and password cracking.
Ch4, 113 |
|
13. Which of the following IT domains is most vulnerable to social engineering?
|
13. User
Ch4, 115 |
|
14. What type of attack can result in arbitrary code execution with system-level privileges?
|
14. Buffer Overflow
Ch4, 134 |
|
15. Name three (3) social engineering techniques?
|
15. Impersonation, Reciprocity and Phishing. (All of these).
Ch4, 129, 144, 145 |
|
16. Which domain marks the boundary where the private network meets the public network?
|
16. LAN-to-WAN
Ch5, 152 |
|
17. A port scanner is a type of vulnerability assessment scanner. True or False?
|
17. False.
N/A |
|
18. Which of the following is NOT covered by a data loss, data leak prevention tool?
|
18. Paper documents
Ch1, 22 Ch15 |
|
19. Which of the following is not a purpose of network analysis?
|
19. Detect security policy violations.
Ch1 |
|
20. Where do you capture network data to analyze inbound/outbound network traffic?
|
20. Inside the perimeter firewall.
Ch1 |
|
21. What can you accomplish by filtering network packets?
|
21. Prevent malware infections.
Ch2, 69 |
|
22. Which of the following characteristics does NOT apply to stateful firewalls?
|
22. Analyze both static and real-time data
Ch2, 69,70,73 |
|
23. What does an application-level proxy do?
|
23. Examines packet payloads.
Ch2, 70, 71 |
|
24. Which of the following is a problem for static filtering?
|
24. Random source ports.
Ch2, 69 |
|
25. What type of firewall keeps track of state tables to sieve network traffic?
|
25. Stateful packet inspection
Ch2, 60, 69 |
|
26. Where should firewall rules that explicitly deny traffic be placed?
|
26. At the top of the rules list
Ch7, 213 |
|
27. What is the most important practice associated with firewall logging?
|
27. Review the log files frequently.
Ch7 227, 228 |
|
28. Which firewall limitation is typically characterized by a memory-based exploit?
|
28. Buffer Overrun (Overflow)
Ch7, 234 |
|
29. Firewall enhancements are desirable in all situations and should be deployed at any cost. True or False?
|
29. False
Ch7, 239, 240 |
|
30. Which of the following characteristics is included in a reverse proxy?
|
30. Caching and authentication
Ch4, 141 Ch8, 261, 262 |
|
31. What is benefit of using VPNs?
|
31. Establish remote network access
Ch3, 85 |
|
32. Which aspect of the VPN prevents others from eavesdropping and observation?
|
32. Cryptographic functions
Ch3, 81 |
|
33. What is an advantage of VPN tunnel mode?
|
33. Encapsulates protocol headers and packet payloads
Ch3, 94 |
|
34. Which of the following characteristics of software VPN makes it less advantageous than hardware VPN?
|
34. Open source clients can be complex to install
Ch12, 2-4 |
|
35. To develop an AUP, you need to _____.
|
35. Establish baseline rules.
Ch5, 151 Ch6, 198 |
|
36. Uninstalling all unnecessary applications and services on a system is an example of which of the following?
|
36. System hardening.
Ch5, 166 |
|
37. 192.168312.12/222.255.255.255. Is an example of which of the following?
|
37. Private IP address.
Ch5, 152 |
|
38. Encryption is primarily concerned with which of the following primary objectives(s)?
|
38. Integrity and confidentiality
Ch1, 21 Ch5, 171,172 |
|
39. Logging what time a user accessed a particular resource is an example of which of the following?
|
39. Accounting
Ch5 171 |
|
40. Using a fingerprint to unlock a workstation is an example of which of the following?
|
40. Something you are
Ch6, 169, 170 |
|
41. What is the primary purpose of log monitoring?
|
41. Detect injection attacks.
Ch6, 229-230 Ch9 |
|
42. Building your own firewall can result in which of the following?
|
42. Complex setup, cost savings and customized features
Ch9 |
|
43. When planning a firewall implementation, which of the following is the key consideration?
|
43. Availability, Address space and Skill set of support personnel (all of these).
Ch2 Ch5 |
|
44. When dealing with a firewall emergency, what should you NOT do?
|
44. Document your network.
Ch9 |
|
45. Which of the following is true for a VPN?
|
45. Has software installed on the host and gateway
Ch14 |
|
46. Which of the following must an administrator organize to ensure follow-through of a new security plan?
|
46. End-user training and awareness
Ch6, 196, 198 |
|
47. Which of the following steps is included in a security assessment?
|
47. Perform a risk assessment, Perform penetration testing and Perform vulnerability scanning (All of these).
Ch6, 205 |
|
48. Which of the following is a valid network monitoring tool?
|
48. Smoke-Ping
N/A |
|
49. Which of the following does NOT represent a valid incident response strategy phase?
|
49. Collection
Ch6, 191 |
|
50. Which of the following is NOT a security management best practice?
|
50. Assign maximum required permissions
Ch6, 182-189 |