Pregunta 1
Pregunta
Which of the following is the best definition for war-driving?
Respuesta
-
Driving and seeking rival hackers
-
Driving while hacking and seeking a computer job
-
Driving looking for wireless networks to hack
-
Driving while using a wireless connection to hack
Pregunta 2
Pregunta
In addition to mandating federal agencies to establish security measures, the Computer Security Act of 1987 defined important terms such as:
Respuesta
-
security information
-
private information
-
unauthorized access
-
sensitive information
Pregunta 3
Pregunta
What are the three approaches to security?
Respuesta
-
High security, medium security, and low security
-
Perimeter, layered, and hybrid
-
Internal, external, and hybrid
-
Perimeter, complete, and none
Pregunta 4
Pregunta
An attack characterized by an explicit attempt by attackers to prevent legitimate users from accessing a system is called:
Respuesta
-
war-dialing
-
spoofing
-
denial of service
-
social engineering
Pregunta 5
Pregunta
The first computer incident response team is affiliated with what university?
Pregunta 6
Pregunta
The process of reviewing logs, records, and procedures to determine whether they meet appropriate standards is called:
Respuesta
-
auditing
-
filtering
-
authenticating
-
sneaking
Pregunta 7
Pregunta
Which of the following best defines the primary difference between a sneaker and an auditor?
Respuesta
-
There is no difference
-
The sneaker tends to be less skilled
-
The sneaker tends to use more unconventional methods
-
The auditor tends to be less skilled
Pregunta 8
Pregunta
Which of the following types of privacy laws affect computer security?
Pregunta 9
Pregunta
An intrusion-detection system is an example of:
Respuesta
-
Proactive security
-
Perimeter security
-
Good security practices
-
Hybrid security
Pregunta 10
Pregunta
Which of the following is the best definition of “sensitive information”?
Respuesta
-
Any information that is worth more than $1,000
-
Any information that has monetary value and is protected by any privacy laws
-
Any information that, if accessed by unauthorized personnel, could damage your organization in any way
-
Military or defense related information
Pregunta 11
Pregunta
Which of the following maintains a repository for information on virus outbreaks and detailed information about specific viruses?
Pregunta 12
Pregunta
Which is a technique used to provide false information about data packets?
Respuesta
-
Phreaking
-
Social engineering
-
Hacking
-
Spoofing
Pregunta 13
Pregunta
What is the term for hacking a phone system?
Respuesta
-
phreaking
-
Cracking
-
Hacking
-
Telco-hacking
Pregunta 14
Pregunta
Which is NOT one of the three broad classes of security threats?
Respuesta
-
Preventing or blocking access to a system
-
Gaining unauthorized access into a system
-
Malicious software
-
Disclosing contents of private networks
Pregunta 15
Pregunta
Are there any reasons not to take an extreme view of security, if that view errs on the side of caution?
Respuesta
-
No, there is no reason not to take such an extreme view.
-
Yes, if you are going to err, assume there are few if any realistic threats.
-
Yes, that can lead to wasting resources on threats that are not likely.
-
Yes, that can require that you increase your security skills in order to implement more rigorous defenses.
Pregunta 16
Pregunta
A text file that is downloaded to a computer by a Web site to provide information about the Web site and online access is called a:
Respuesta
-
cookie
-
Trojan horse
-
script kiddy
-
key logger
Pregunta 17
Pregunta
Which of the following is the most basic security activity?
Pregunta 18
Pregunta
Which of the following is NOT a connectivity device used to connect machines on a network?
Respuesta
-
Network interface card
-
Hub
-
Proxy server
-
Switch
Pregunta 19
Pregunta
The process of determining whether the credentials given by a user are authorized to access a particular network resource is called:
Respuesta
-
auditing
-
accessing
-
authorization
-
authentication
Pregunta 20
Pregunta
Which approach to security is proactive in addressing potential threats before they occur?
Respuesta
-
Layered security approach
-
Passive security approach
-
Dynamic security approach
-
Hybrid security approach
Pregunta 21
Pregunta
Those who exploit systems for harm such as to erase files, change data, or deface Web sites are typically called:
Respuesta
-
gray hat hackers
-
black hat hackers
-
white hat hackers
-
red hat hackers
Pregunta 22
Pregunta
Encryption and virtual private networks are techniques used to secure which of the following?
Respuesta
-
Connection points
-
Data
-
Firewalls
-
Proxy servers
Pregunta 23
Pregunta
Which of the following is the best definition for the term sneaker?
Respuesta
-
An amateur hacker
-
A person who hacks a system to test its vulnerabilities
-
A person who hacks a system by faking a legitimate password
-
An amateur who hacks a system without being caught
Pregunta 24
Pregunta
Which of the following is not one of the three major classes of threats?
Pregunta 25
Pregunta
Which is NOT one of the three broad classes of security threats?
Respuesta
-
Disclosing contents of private networks
-
Malicious software
-
Preventing or blocking access to a system
-
Gaining unauthorized access into a system
Pregunta 26
Pregunta
What is a computer virus?
Respuesta
-
Any program that can change your Windows registry.
-
Any program that self replicates
-
Any program that causes harm to your system
-
Any program that is downloaded to your system without your permission
Pregunta 27
Pregunta
When assessing threats to a system, what three factors should you consider?
Respuesta
-
How much traffic the system gets, the security budget, and the skill level of the security team
-
The system’s attractiveness, the information contained on the system, and how much traffic the system gets
-
The skill level of the security team, the system’s attractiveness, and how much traffic the system gets
-
The system’s attractiveness, the information contained on the system, and the security budget
Pregunta 28
Pregunta
Which of the following would most likely be classified as misuses of systems?
Respuesta
-
Using your business computer to conduct your own (non-company) business
-
Getting an occasional personal email
-
Looking up information on a competitor using the Web
-
Shopping on the web during lunch
Pregunta 29
Pregunta
What is a technique used to determine if someone is trying to falsely deny that they performed a particular action?
Pregunta 30
Pregunta
Which approach to security addresses both the system perimeter and individual systems within the network?
Respuesta
-
Perimeter security approach
-
Layered security approach
-
Hybrid aecurity approach
-
Dynamic security approach
Pregunta 31
Pregunta
Which of the following gives the best definition of spyware?
Respuesta
-
Any software that monitors which Web sites you visit
-
Any software or hardware that monitors your system
-
Any software that logs keystrokes
-
Any software used to gather intelligence
Pregunta 32
Pregunta
Which of the following is the best definition for non-repudiation?
Respuesta
-
It is another term for user authentication
-
Processes that verify which user performs what action
-
Security that does not allow the potential intruder to deny his attack
-
Access control
Pregunta 33
Pregunta
Blocking attacks seek to accomplish what?
Respuesta
-
Prevent legitimate users from accessing a system
-
Breaking into a target system
-
Shut down security measures
-
Install a virus on the target machine
Pregunta 34
Pregunta
Which term is generally used by hackers to refer to attempts at intrusion into a system without permission and usually for malevolent purposes?
Respuesta
-
Social engineering
-
Blocking
-
Hacking
-
Cracking
Pregunta 35
Pregunta
The most desirable approach to security is one which is:
Respuesta
-
Layered and dynamic
-
Perimeter and static
-
Layered and static
-
Perimeter and dynamic
Pregunta 36
Pregunta
Which of the following activities do security professionals recommend to limit the chances of becoming a target for a Trojan horse?
Respuesta
-
Prevent employees from downloading and installing any programs
-
Download and install Windows updates and patches monthly
-
Only open e-mail attachments from friends or co-workers
-
Only download jokes, animated Flash files, or utility programs from popular sites
Pregunta 37
Pregunta
Which method of defense against a SYN flood involves altering the response timeout?
Respuesta
-
Micro blocks
-
SYN cookies
-
RST cookies
-
Stack tweaking
Pregunta 38
Pregunta
Which created a buffer overflow attack against a Windows flaw called the DCOM RPC vulnerability?
Respuesta
-
Blaster
-
MyDoom
-
SoBig
-
Slammer
Pregunta 39
Pregunta
What do many analysts believe was the reason for the MyDoom virus/worm?
Respuesta
-
A DoS attack against Microsoft.com
-
A DoS attack targeting Microsoft Windows IIS servers
-
An e-mail attack targeting Bill Gates
-
A DDoS attack targeting Santa Cruz Operations
Pregunta 40
Pregunta
Which is NOT true about a buffer overflow attack?
Respuesta
-
Susceptibility to a buffer overflow is entirely contingent on software flaws.
-
A hacker does not need a good working knowledge of some programming language to create a buffer overflow.
-
A buffer overflow can load malicious data into memory and run it on a target machine.
-
A careful programmer will write applications so the buffer will truncate or reject data that exceeds the buffer length.
Pregunta 41
Pregunta
What is the name for a DoS defense that is dependent on sending back a hash code to the client?
Respuesta
-
Server reflection
-
RST cookie
-
Stack tweaking
-
SYN cookie
Pregunta 42
Pregunta
What is the best way to defend against a buffer overflow?
Respuesta
-
Stopping all ICMP traffic
-
Using a robust firewall
-
Keeping all software patched and updated
-
Blocking TCP packets at the router
Pregunta 43
Pregunta
The spread of viruses can be minimized by all of the following EXCEPT:
Respuesta
-
using a code word with friends to determine if attachments are legitimate
-
using a virus scanner
-
immediately following instructions in security alerts e-mailed to you from Microsoft
-
never opening attachments you are unsure of
Pregunta 44
Pregunta
Which of the following is NOT a denial of service attack?
Respuesta
-
Ping of Death
-
SYN flood
-
Smurf attack
-
Stack tweaking
Pregunta 45
Pregunta
Which of the following is the best definition for IP spoofing?
Respuesta
-
Sending packets that are misconfigured
-
Sending a packet that appears to come from a trusted IP
-
Setting up a fake Web site that appears to be a different site
-
Rerouting packets to a different IP
Pregunta 46
Pregunta
Which attack relies on broadcast packets to cause a network to actually flood itself with ICMP packets?
Respuesta
-
Smurf attack
-
SYN flood
-
Tribal flood
-
ICMP flood
Pregunta 47
Pregunta
Which attack occurs by sending packets that are too large for the target machine to handle?
Respuesta
-
SYN flood
-
ICMP flood
-
Ping of death
-
Stack tweaking
Pregunta 48
Pregunta
One of the most common types of attacks via the Internet is:
Respuesta
-
Buffer overflow
-
IP spoofing
-
Session hacking
-
Denial of service
Pregunta 49
Pregunta
Which of the following virus attacks initiated a DoS attack?
Respuesta
-
Walachi
-
MyDoom
-
Bagle
-
Faux
Pregunta 50
Pregunta
Which router configuration is potentially least vulnerable to an attack?
Respuesta
-
Routers that filter packets with source addresses in the local domain
-
Proxy firewalls where the proxy applications use the source IP address for authentication
-
Routers to external networks that support multiple internal interfaces
-
Routers with two interfaces that support subnetting on the internal network
Pregunta 51
Pregunta
What is a technical weakness of the Stack tweaking defense?
Respuesta
-
It only decreases time out but does not actually stop DoS attacks
-
It is complicated and requires very skilled technicians to implement
-
It is resource intensive and can degrade server performance.
-
It is ineffective against DoS attacks
Pregunta 52
Pregunta
Which created a domestic “cyber terrorism” attack against a Unix distributor?
Respuesta
-
MyDoom
-
W32.Storm.Worm
-
Blaster
-
Slammer
Pregunta 53
Pregunta
What is the name for a DoS attack that causes machines on a network to initiate a DoS against one of that network’s servers?
Pregunta 54
Pregunta
Which of the following would be the best defense if your Web server had limited resources but you needed a strong defense against DoS?
Respuesta
-
Stack tweaking
-
A firewall
-
SYN cookies
-
RST cookies
Pregunta 55
Pregunta
What was the greatest damage from the Bagle virus?
Respuesta
-
It deleted system files
-
It corrupted the Windows registry
-
It was difficult to detect
-
It shut down antivirus software
Pregunta 56
Pregunta
How does the SYN cookie work?
Respuesta
-
Replaces cookies left by virus/worm programs.
-
Causes server to send wrong SYNACK to the client.
-
Prevents memory allocation until third part of SYN ACK handshaking.
-
Enables encryption of outbound packets.
Pregunta 57
Pregunta
From the attacker’s point of view, what is the primary weakness in a DoS attack?
Respuesta
-
The attack does not cause actual damage
-
The attack must be sustained.
-
The attack is difficult to execute
-
The attack is easily thwarted
Pregunta 58
Pregunta
Shutting down router and firewall ports 5554 and 9996 will block most damage from which of these?
Respuesta
-
Sobig
-
Trojan horses
-
Bagle
-
Sasser
Pregunta 59
Pregunta
Which attack causes Internet routers to attack the target systems without actually compromising the routers themselves?
Pregunta 60
Pregunta
Which attack relies on broadcast packets to cause a network to actually flood itself with ICMP packets?
Respuesta
-
Tribal flood
-
SYN flood
-
Smurf attack
-
ICMP flood
Pregunta 61
Pregunta
What DoS attack is based on leaving connections half open?
Pregunta 62
Pregunta
What is the best method of defending against IP spoofing?
Respuesta
-
Installing a router/firewall that blocks packets that appear to be originating within the network
-
Blocking all incoming TCP traffic
-
Blocking all incoming ICMP traffic
-
Installing a router/firewall that blocks packets that appear to be originating from outside the network
Pregunta 63
Pregunta
Which of the following best describes session hacking?
Respuesta
-
Taking over a target machine via a Trojan horse
-
Taking control of the login session
-
Taking control of a target machine remotely
-
Taking control of the communication link between two machines
Pregunta 64
Pregunta
Which of the following is a recommended configuration of your firewall to defend against DoS attacks?
Respuesta
-
Block TCP packets that originate outside your network
-
Block all incoming packets
-
Block ICMP packets that originate outside your network
-
Block all ICMP packets
Pregunta 65
Pregunta
Which copies itself into the Windows directory and creates a registry key to load itself at startup?
Respuesta
-
Slammer
-
MyDoom
-
Sasser
-
Bagle
Pregunta 66
Pregunta
Which presented itself as an e-mail from the system administrator informing the user of a virus infection and gave directions to open an e-mail attachment which would then scan for e-mail addresses and shared folders?
Respuesta
-
Sobig
-
Sasser
-
Minmail
-
Bagle
Pregunta 67
Pregunta
Which of the following best describes a buffer overflow attack?
Respuesta
-
An attack that attempts to put misconfigured data into a memory buffer
-
An attack that attempts to send oversized TCP packets
-
An attack that attempts to put too much data in a memory buffer
-
An attack that overflows the target with too many TCP packets
Pregunta 68
Pregunta
What is a Trojan horse?
Respuesta
-
Software that deletes system files then infects other machines
-
Software that self replicates
-
Software that causes harm to your system
-
Software that appears to be benign but really has some malicious purpose
Pregunta 69
Pregunta
Which of the following denial of service attacks results from a client’s failure to respond to the server’s reply to a request for connection?
Respuesta
-
ICMP flood
-
SYN flood
-
Tribal flood
-
UDP flood
Pregunta 70
Pregunta
What is the danger inherent in IP spoofing attacks?
Respuesta
-
Many of these attacks open the door for other attacks
-
Many firewalls don’t examine packets that seem to come from within the network.
-
They can be difficult to stop
-
They are very damaging to target systems
Pregunta 71
Pregunta
Which is NOT a typical adverse result of a virus?
Pregunta 72
Pregunta
What type of firewall is Check Point Firewall-1?
Pregunta 73
Pregunta
What implementation is Check Point Firewall-1?
Respuesta
-
Switch based
-
Host based
-
Network based
-
Router based
Pregunta 74
Pregunta
Which is a hardware firewall vendor manufacturing Stateful Packet Inspection units with NAT and DES especially for small offices?
Respuesta
-
Cisco
-
Wolverine
-
D-Link
-
Check Point
Pregunta 75
Pregunta
Should a home user with ICF block port 80, and why or why not?
Respuesta
-
She should not because it would prevent her from using Web Pages
-
She should not because that will prevent her from getting updates and patches
-
She should unless she is running a Web server on her machine.
-
She should because port 80 is a common attack point for hackers
Pregunta 76
Pregunta
Why is an SPI firewall more resistant to flooding attacks?
Respuesta
-
It requires user authentication
-
It examines each packet in the context of previous packets
-
It automatically blocks large traffic from a single IP
-
It examines the destination IP of all packets
Pregunta 77
Pregunta
Snort is which type of IDS?
Respuesta
-
Client-based
-
Router-based
-
OS-based
-
Host-based
Pregunta 78
Pregunta
Snort is which type of IDS?
Respuesta
-
Client-based
-
Router-based
-
OS-based
-
Host-based
Pregunta 79
Pregunta
What is one complexity found in enterprise environements that is unlikely in small networks or SOHO environments?
Pregunta 80
Pregunta
Which type of IDS is the Cisco Sensor?
Respuesta
-
Anomaly detection
-
Intrusion deterrence
-
Intrusion deflection
-
Anomaly deterrence
Pregunta 81
Pregunta
It should be routine for someone in the IT security staff to
Pregunta 82
Pregunta
Using a server running the Linux operating system with its built-in firewall as the network firewall is one example of which firewall configuration?
Respuesta
-
router-based
-
dual-homed host
-
network host-based
-
screened host
Pregunta 83
Pregunta
What is an advantage of an enterprise environment?
Pregunta 84
Pregunta
Which is true about SonicWALL firewall solutions?
Respuesta
-
They work on Linux, Unix, Solaris, and Windows platforms.
-
They are relatively inexpensive.
-
All models contain built-in encryption.
-
They include built-in proxy server capabilities.
Pregunta 85
Pregunta
In which mode of operation does Snort display a continuous stream of packet contents to the console?
Pregunta 86
Pregunta
In comparing a packet filter firewall with a stateful packet inspection firewall (SPI), the SPI firewall is:
Respuesta
-
LESS susceptible to ping and SYN floods but MORE susceptible to IP spoofing
-
LESS susceptible to ping and SYN floods and LESS susceptible to IP spoofing.
-
MORE susceptible to ping and SYN floods and MORE susceptible to IP spoofing
-
MORE susceptible to ping and SYN floods and LESS susceptible to IP spoofing
Pregunta 87
Pregunta
Which of the following are four basic types of firewalls?
Respuesta
-
Screening, bastion, dual-homed, circuit level
-
Packet filtering, application gateway, circuit level, stateful packet inspection
-
Stateful packet inspection, gateway, bastion, screening
-
Application gateway, bastion, dual-homed, screening
Pregunta 88
Pregunta
In many typical configurations with multiple firewalls, e-mail servers and FTP servers are located in the:
Pregunta 89
Pregunta
Which of the following is not an advantage of the Fortigate firewall?
Respuesta
-
Built-in encryption
-
Built-in virus scanning
-
Content filtering
-
Low cost
Pregunta 90
Pregunta
Should a home user block ICMP traffic, and why or why not?
Respuesta
-
It should be blocked because such traffic is often used to transmit a virus
-
It should be blocked because such traffic is often used to do port scans and flood attacks
-
It should not be blocked because it is necessary for network operations
-
It should not be blocked because it is necessary for using the Web
Pregunta 91
Pregunta
Why might a proxy gateway be susceptible to a flood attack?
Respuesta
-
It does not require user authentication
-
It allows multiple simultaneous connections
-
It does not properly filter packets
-
Its authentication method takes more time and resources
Pregunta 92
Pregunta
A standalone technology that hides internal addresses from the outside and only allows connections that originate from inside the network is called:
Pregunta 93
Pregunta
What is another term for preemptive blocking?
Respuesta
-
Banishment vigilance
-
Intruder blocking
-
Intrusion deflection
-
User deflection
Pregunta 94
Pregunta
Which serves as a single contact point between the Internet and the private network?
Respuesta
-
Bastion host
-
DMZ
-
Screened host
-
Dual-homed host
Pregunta 95
Pregunta
One type of intrusion-detection and avoidance which involves identifying suspect IP addresses and preventing intrusions is called:
Respuesta
-
anomaly detection
-
intrusion deterrence
-
preemptive blocking
-
intrusion deflection
Pregunta 96
Pregunta
NAT is a replacement for what technology?
Respuesta
-
Proxy server
-
Firewall
-
IDS
-
Antivirus software
Pregunta 97
Pregunta
Which is a robust commercial software firewall solution for Linux operating systems?
Respuesta
-
SonicWALL
-
Wolverine
-
McAfee Personal Firewall
-
Symantec Norton Firewall
Pregunta 98
Pregunta
Which is true about Windows XP Internet Connection Firewall (ICF)?
Respuesta
-
It has a logging feature enabled by default.
-
It works best in conjunction with a perimeter firewall.
-
It blocks incoming and outgoing packets.
-
It is a screened host firewall.
Pregunta 99
Pregunta
Which of the following is not a profiling strategy used in anomaly detection?
Respuesta
-
Executable profiling
-
Threshold monitoring
-
Resource profiling
-
System monitoring
Pregunta 100
Pregunta
Which type of intrusion-detection relies on people rather than software or hardware?
Respuesta
-
Banishment vigilance
-
Intrusion deterrence
-
Infiltration
-
Anomaly detection
Pregunta 101
Pregunta
Which type of firewall is included in Windows XP and many distributions of Linux operating systems?
Pregunta 102
Pregunta
What is one complexity found in enterprise environements that is unlikely in small networks or SOHO environments?
Pregunta 103
Pregunta
What type of firewall requires individual client applications to be authorized to connect?
Pregunta 104
Pregunta
Which of the following is not one of Snort’s modes?
Pregunta 105
Pregunta
What tool does McAfee Personal Firewall offer?
Pregunta 106
Pregunta
An open source software circuit level gateway is available from which of the following?
Respuesta
-
Watchguard Technologies
-
SonicWALL
-
Teros
-
Amrita Labs
Pregunta 107
Pregunta
Which of the following are four basic types of firewalls?
Respuesta
-
Application gateway, bastion, dual-homed, screening
-
Packet filtering, application gateway, circuit level, stateful packet inspection
-
Stateful packet inspection, gateway, bastion, screening
-
Screening, bastion, dual-homed, circuit level
Pregunta 108
Pregunta
Which type of firewall creates a private virtual connection with the client?
Respuesta
-
Circuit level gateway
-
Dual-homed
-
Application gateway
-
Bastion
Pregunta 109
Pregunta
Which type of firewall negotiates between the server and client to permit or deny connection based on the type of software and connection requested?
Pregunta 110
Pregunta
Which firewall configuration would be appropriate within a network to separate and protect various subnets of a network to provide greater security?
Respuesta
-
bastion host
-
demilitarized zone
-
router-based
-
dual-homed host
Pregunta 111
Pregunta
Which of the following is not a common feature of most single PC firewalls?
Respuesta
-
Packet filtering
-
Software-based
-
Ease of use
-
Built-in NAT
Pregunta 112
Pregunta
It should be routine for someone in the IT security staff to
Pregunta 113
Pregunta
A firewall designed to secure an individual personal computer is a:
Pregunta 114
Pregunta
What type of firewall is SonicWALL TI70?
Pregunta 115
Pregunta
Which of the following is an advantage of the network host-based configuration?
Respuesta
-
It is resistant to IP spoofing
-
It has user authentication
-
It is inexpensive or free
-
It is more secure
Pregunta 116
Pregunta
Which of the following is a benefit of Cisco firewalls?
Respuesta
-
Very low cost
-
Built-in virus scanning on all products
-
Built-in IDS on all products
-
Extensive training available on the product
Pregunta 117
Pregunta
Once a circuit level gateway verifies the user’s logon, it creates a virtual circuit between:
Respuesta
-
the internal client and the external server
-
the external server and the proxy server
-
the external server and the firewall
-
the internal client and the proxy server
Pregunta 118
Pregunta
At what OSI layer do packet filters function?
Respuesta
-
Physical layer
-
Transport layer
-
Network layer
-
Data link layer
Pregunta 119
Pregunta
Which is NOT a function of an intrusion-detection system?
Respuesta
-
Inspect all inbound and outbound port activity
-
Notify the system administrator of suspicious activity
-
Infiltrate the illicit system to acquire information
-
Look for patterns in port activity
Pregunta 120
Pregunta
What might one see in an implementation of intrusion deterrence?
Respuesta
-
Real resources with fake names
-
Fake resources with legitimate-sounding names
-
Blocking of legitimate users by mistake
-
Profiling of users, resources, groups, or applications
Pregunta 121
Pregunta
A system that is set up for attracting and monitoring intruders is called what?
Respuesta
-
Fly paper
-
Honey pot
-
Hacker cage
-
Trap door
Pregunta 122
Pregunta
A device that hides internal IP addresses is called
Respuesta
-
Dual-homed host
-
Bastion firewall
-
Proxy server
-
A screened host
Pregunta 123
Pregunta
Medium-sized networks have what problem?
Pregunta 124
Pregunta
A firewall that uses a combination of approaches rather than a single approach to protect the network is called:
Respuesta
-
multi-homed
-
dual-homed
-
open source
-
hybrid
Pregunta 125
Pregunta
How can vulnerability to flooding attacks be reduced with an application gateway?
Respuesta
-
Packets are continually checked during the connection
-
Vulnerability to flooding attacks with an application gateway cannot be mitigated
-
Authenticating users
-
External systems never see the gateway
Pregunta 126
Pregunta
Identifying abnormal activity on a firewall requires that one establish a:
Respuesta
-
baseline
-
screened host
-
bastion host
-
proxy server
Pregunta 127
Pregunta
An intrusion-detection system detecting a series of ICMP packets sent to each port from the same IP address might indicate:
Respuesta
-
scanning of the system for vulnerabilities prior to an attack
-
Trojan horse/virus infection sending information back home
-
a Distributed Denial of Service attack in progress
-
the system has been infiltrated by an outsider
Pregunta 128
Pregunta
Why is an SPI firewall less susceptible to spoofing attacks?
Respuesta
-
It requires user authentication
-
It requires client application authentication
-
It automatically blocks spoofed packets
-
It examines the source IP of all packets
Pregunta 129
Respuesta
-
Windows XP Internet Connection Firewall
-
Windows 2000 Internet Connection Firewall
-
Windows 2000 Internet Control Firewall
-
Windows XP Internet Control Firewall
Pregunta 130
Pregunta
Which is a firewall vendor manufacturing a host-based firewall for Windows 2000 Server, Sun Solaris, and Red Hat Linux environments?
Respuesta
-
D-Link
-
Wolverine
-
Check Point
-
Cisco
Pregunta 131
Pregunta
Which of the following is not a reason to avoid choosing infiltration as part of an IDS strategy?
Pregunta 132
Pregunta
A series of ICMP packets sent to your ports in sequence might indicate what?
Respuesta
-
A packet sniffer
-
A port scan
-
A DoS attack
-
A ping flood
Pregunta 133
Pregunta
An intrusion-detection method that measures and monitors how programs use system resources is called:
Respuesta
-
user/group profiling.
-
resource profiling.
-
executable profiling.
-
threshold monitoring.
Pregunta 134
Pregunta
Which strategy is used in the implementation of intrusion deterrence?
Respuesta
-
Installing honey pots to pose as important system
-
Monitoring connection attempts to identify IP addresses of attackers
-
Using fake names to camouflage important systems
-
Infiltrating online hacker groups
Pregunta 135
Pregunta
Which method of intrusion-detection develops historic usage levels to measure activity against?
Respuesta
-
Threshold monitoring
-
Application profiling
-
Resource profiling
-
Infiltration profiling
Pregunta 136
Pregunta
What is the greatest danger in a network host-based configuration?
Pregunta 137
Pregunta
Which type of firewall is generally the simplest and least expensive?
Pregunta 138
Pregunta
Implementation of intrusion deflection as a strategy requires the use of:
Pregunta 139
Pregunta
Which of the following is found in Norton’s personal firewall but not in ICF?
Pregunta 140
Pregunta
Which of the following is a common problem when seeking information on firewalls?
Respuesta
-
Unbiased information may be hard to find.
-
It is difficult to find information on the Web.
-
Information often emphasizes price rather than features.
-
Documentation is often incomplete
Pregunta 141
Pregunta
Which of the following can be shipped preconfigured?
Pregunta 142
Pregunta
Which is a term used to refer to the process of authentication and verification?
Respuesta
-
Filtering
-
Negotiation
-
Connecting
-
Screening
Pregunta 143
Pregunta
Which type of firewall negotiates between the server and client to permit or deny connection based on the type of software and connection requested?
Pregunta 144
Pregunta
Which intrusion detection strategy monitors and compares activity against preset acceptable levels?
Respuesta
-
Threshold monitoring
-
Infiltration monitoring
-
Application monitoring
-
Resource profiling
Pregunta 145
Pregunta
Which of the following is a problem with the approach of a profiling strategy that is used in anomaly detection?
Pregunta 146
Pregunta
What is the purpose of the warning configuration for Specter’s email file?
Respuesta
-
To scare off at least novice hackers
-
To keep your normal users honest
-
To deter highly skilled hackers
-
To track hackers back to their source IPs
Pregunta 147
Pregunta
Regarding the Firewall-1 firewall, which of the following is NOT true?
Respuesta
-
It is particularly vulnerable to SYN floods.
-
It is a packet filtering, application gateway hybrid.
-
It uses Stateful Packet Inspection.
-
It automatically blocks and logs oversized packets.
Pregunta 148
Pregunta
IDS is an acronym for:
Respuesta
-
Intrusion deterrence service
-
Intrusion-detection service
-
Intrusion deterrence system
-
Intrusion-detection system
Pregunta 149
Pregunta
What is the most important security advantage to NAT?
Respuesta
-
It hides internal network addresses
-
By default it blocks all ICMP packets
-
It blocks incoming ICMP packets
-
By default it only allows outbound connections
Pregunta 150
Pregunta
Which is true about the Wolverine firewall solution?
Respuesta
-
It includes built-in VPN capabilities.
-
It works on Linux, Unix, Solaris, and Windows platforms.
-
Encryption can be added with a free Web download.
-
It is expensive.
Pregunta 151
Pregunta
What four rules must be set for packet filtering firewalls?
Respuesta
-
Username, password, protocol type, destination IP
-
Source IP, destination IP, username, password
-
Protocol type, source port, destination port, source IP
-
Protocol version, destination IP, source port, username
Pregunta 152
Pregunta
Setting up parameters for acceptable use, such as the number of login attempts, and watching to see if those levels are exceeded is referred to as what?
Respuesta
-
Resource profiling
-
Executable profiling
-
System monitoring
-
Threshold monitoring
Pregunta 153
Pregunta
Attempts by an intruder to determine information about a system prior to the start of an intrusion attack is called:
Respuesta
-
foot printing
-
infiltration
-
deflecting
-
detecting
Pregunta 154
Pregunta
Which is NOT a service included in the Norton single machine firewall?
Pregunta 155
Pregunta
Banishment vigilance is another name for:
Respuesta
-
anomaly detection
-
intrusion deflection
-
intrusion deterrence
-
preemptive blocking
Pregunta 156
Pregunta
Which type of encryption is included with the T170?
Respuesta
-
PGP and AES
-
WEP and DES
-
WEP and PGP
-
AES and DES
Pregunta 157
Pregunta
Which is a unique feature of the McAfee Personal Firewall that is not found on most personal firewalls?
Respuesta
-
Blocking incoming traffic on selected ports
-
Online scanning of system for vulnerabilities
-
Performing traceroute to show the source of incoming packets
-
Recording a log of all attempts at incoming packets
Pregunta 158
Pregunta
Why might you run Specter in strange mode?
Respuesta
-
It will be difficult to determine the system is a honey pot
-
It will deter novice hackers
-
It may fascinate hackers and keep them online long enough to catch them
-
It may confuse hackers and deter them from your systems
Pregunta 159
Pregunta
A firewall configuration using a server as a router and running multiple network interfaces with automatic routing disabled is an example of a:
Respuesta
-
dual-homed host
-
screened host
-
router-based
-
network host-based
Pregunta 160
Pregunta
Why might a proxy gateway be susceptible to a flood attack?
Respuesta
-
Its authentication method takes more time and resources
-
It does not properly filter packets
-
It allows multiple simultaneous connections
-
It does not require user authentication
Pregunta 161
Pregunta
Which intrusion-detection method measures activity levels against known short-term and/or long-term work profiles?
Pregunta 162
Pregunta
Why might a circuit level gateway be inappropriate for some situations?
Respuesta
-
It blocks web traffic
-
It is simply too expensive
-
It has no user authentication
-
It requires client side configuration
Pregunta 163
Pregunta
Which is NOT true about enterprise networks and firewall solutions?
Respuesta
-
They are likely to be supported by multiple network administrators.
-
They are usually made up of several interconnected networks.
-
They are usually easier to manage and secure.
-
They are likely to contain several different operating systems.
Pregunta 164
Pregunta
Attempting to make your system appear less appealing is referred to as what?
Respuesta
-
Intrusion deterrence
-
System deterrence
-
System camouflage
-
Intrusion deflection
Pregunta 165
Pregunta
Which of the following is an important feature of D-Link DFL 300?
Respuesta
-
Vulnerability scanning
-
Liberal licensing policy
-
WEP encryption
-
Built-in IDS
Pregunta 166
Pregunta
Which firewall solution would be best for a large enterprise running Windows XP Professional and Linux operating systems, using the Internet, and requiring remote access to their Intranet server for field sales people?
Pregunta 167
Pregunta
Why is an SPI firewall more resistant to flooding attacks?
Respuesta
-
It automatically blocks large traffic from a single IP
-
It requires user authentication
-
It examines each packet in the context of previous packets
-
It examines the destination IP of all packets
Pregunta 168
Pregunta
A profiling technique that monitors how applications use resources is called what?
Respuesta
-
Application monitoring
-
Resource profiling
-
System monitoring
-
Executable profiling
Pregunta 169
Pregunta
Symantec Decoy Server does all of the following EXCEPT:
Respuesta
-
simulate incoming mail server functions
-
record all traffic related to an intrusion attack
-
simulate outgoing mail server functions
-
track attacking packets to their source
Pregunta 170
Pregunta
Attempting to attract intruders to a system set up to monitor them is called what?
Respuesta
-
Intrusion routin
-
Intrusion deterrence
-
Intrusion banishment
-
Intrusion deflection
Pregunta 171
Pregunta
Which type of firewall is considered the most secure?
Pregunta 172
Pregunta
Following rules and learning from experience as part of the process to identify and notify an administrator about an intrusion are typical when Snort is operating in which mode?
Pregunta 173
Pregunta
Using a server running the Linux operating system with its built-in firewall as the network firewall is one example of which firewall configuration?
Respuesta
-
screened host
-
network host-based
-
router-based
-
dual-homed host
Pregunta 174
Pregunta
Which of the following solutions is actually a combination of firewalls?
Respuesta
-
Dual-homed firewalls
-
Router-based firewalls
-
Screened firewalls
-
Bastion host firewalls
Pregunta 175
Pregunta
Which is NOT one of the basic premises under which a honey pot functions?
Respuesta
-
Intruders will tend to go for easy targets with valuable data
-
Any traffic to the honey pot is suspicious
-
Security must allow attackers inside
-
Only legitimate users have a reason to connect to it
Pregunta 176
Pregunta
In many typical configurations with multiple firewalls, e-mail servers and FTP servers are located in the: