Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
A rabbit is what type of attack?
|
Denial of service.
|
|
What can you do to absolutely protect yourself from someone compromising your security?
|
There's nothing you can do.
|
|
The weakest link in security is which of the following?
|
The human being.
|
|
The network address for a machine whose IP address is 10.4.21.105 and net mask is 255.255.0.0 is which of the following?
|
10.4.0.0
|
|
What is the decimal equivalent of the hexadecimal value bd?
|
189.
|
|
What is the binary equivalent of the decimal value 204?
|
11001100.
|
|
What does a packet sniffer do?
|
Allows a user to view all the packets transmitted on the local subnet.
|
|
Which of the following can view a packet's data when it is sent over the internet?
|
Any machine on a subnet the packet must travel through to get from the sending machine to the receiving machine.
|
|
IP spoofing is the act of which of the following?
|
Transmitting packets with a forged source IP address.
|
|
What happens when a server's TCP backlog fills up with half-open connections?
|
The server stops accepting new connections.
|
|
The main task of a firewall is to do which of the following?
|
Filter packets based on source IP address, filter packets based on destination IP address, filter packets based on source parts, filter packets based on destination port.
|
|
When can a firewall protect against IP spoofing attacks?
|
When there is a small finite number of subnets behind it.
|
|
True or False.
A machine with no important or sensitive information stored on it has no need for security. |
False.
|
|
What are acts that a hacker can commit after compromising the security of a computer system?
|
Delete the contents of the hard disk, modify data, use this machine to gain access to other machines.
|
|
A buffer overflow is what type of attack?
|
Bug.
|