cyber security 6
Which device is connected to a port on a switch in order to receive network traffic?
Passive IDS
A mail gateway can have many functions
Which choice is NOT one of those functions?
Require full tunnel
One way to secure data is through Data Loss Prevention (DLP). Which of the choices is not a data type protected by DLP?
Data-to-disclose
Which of the DLP sensor choices requires communication with the DLP server?
DLP agent
Which of the following devices can identify the application that send packets and then make decisions about filtering based on it?
application-based firewall
Which of the following is a multipurpose security device?
Unified Threat
Management (UTM)
Which is the most secure type of firewall?
stateful packet filtering
Which device is easiest for an
attacker to take advantage of to
capture and analyze packets?
hub
Which of these would NOT be a filtering mechanism found in a firewall ACL rule?
date
Which statement regarding a demilitarized zone (DMZ) is NOT true?
It contains servers that are a & used only by internal network users.
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the
organization's secure intranet.
Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?
A bridge could permit access to the secure wired network from the unsecured wireless network
Which of the following CANNOT be used to hide information about the internal network?
a protocol analyzer
Which of these is NOT used in scheduling a load balancer?
The IP address of the destination packet
Sebastian was explaining to his supervisor why the enterprise needed to implement port security.
His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred.
Which of the following was NOT an answer that was given by Sebastian?
Cause the device to enter a fail-open mode.
Which function does an Internet content filter NOT perform?
intrusion detection
Which device watches for attacks and sounds an alert only when one occurs?
network intrusion
detection system (NIDS)
Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?
router
Which statement about network address translation (NAT) is true?
It removes private addresses when the packet leaves the network.
Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch.
What would Francisco say?
Once the MAC address table is full the switch functions like a network hub.
Raul was asked to configure the
VPN to preserve bandwidth. Which configuration would he choose?
Split tunnel
In which of the following configurations are all the load balancers always active?
Active-active
How does network address translation (NAT) improve security?
It discards unsolicited packets.
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
A NIPS can take actions more quickly to combat an attack.
Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?
Once the MAC address table is full the switch functions like a network hub.
What kind of attack is performed by
an attacker who takes advantage of
the inadvertent and unauthorized
access built through three
succeeding systems that all trust one
another?
privilege escalation
substitutes DNS addresses so that the computer is automatically redirected to another device?
DNS poisoning
Which of these is NOT a DoS attack?
push flood
Why are extensions, plug-ins, and add-ons considered to be security risks?
They have introduced vulnerabilities in browsers.
Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about?
Privilege escalation
Which action cannot be performed through a successful SQL injection attack?
reformat the web application server's hard drive
What is the difference between a
DoS and a DDoS attack?
DoS attacks use fewer computers than DDoS
attacks
What type of attack involves manipulating third-party ad networks?
Malvertising
An attacker who manipulates the maximum size of an integer type would be performing what kind of attack?
integer overflow
Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser?
Plug-ins
Olivia was asked to protect the system from a DNS poisoning attack.
What are the locations she would need to protect?
Host table and external
DNS server
What is a session token?
a random string assigned
by a web server
A replay attack does what ?
makes a copy of the transmission for use at a
later time
Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks?
Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.
Which of these is not a DoS attack?
push flood
John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing?
XSS
Which attack intercepts communications between a web
browser and the underlying computer?
man-in-the-browser
(MITB)
What is the basis of an SQL injection attack?
to insert SQL statements through unfiltered user input
Which attack uses the user's web browser settings to impersonate that user?
XSRF
Attackers who register domain names that are similar to legitimate domain names are performing what?
URL hijacking
What type of attack intercepts legitimate communication and forges a fictitious response to the sender?
MITM
What hardware based solutions are measures for fault tolerance?
(Choose all that apply.)
RAID
Clustering
Load balancing
To increase fault-tolerance, the security administrator for Corp.com has installed an active/passive firewall cluster where the second firewall is held in reserve in case of primary firewall failure. Stateful firewall inspection is being used in the firewall implementation.
There have been numerous reports of dropped connections with external clients. Which of the following is MOST likely the cause of this problem?
Inbound packets are traversing the active firewall and return traffic is being sent through the passive firewall
Quiz |
---|
Homework |
noah |
English |
acid/bases |
Meningar |
6008 EthicsExam Practice |
Kemi prov frågor |
6008 Steps in the Audit Life CycleExam Preparation |
Korea 1 |
6008 Business Impact AnalysiExam Practice |
Business formulae |
Juridik inför tenta |
mouvement circulaire |
6008 Risk AssessmentExam Practice |
cyber security 4 & 5 |
privatjuridik fastighetsrättkj |
Vocabulary |
1. Divers modes d’alimentation des animaux Les divers modes d’alimentation des a |
DT 5 - ProcedursederingProcedursedering m läkemedel |
SYDAFRIKA |
ogl202 - kopia |
kut ak twee dagen van tevoren 😊kaulo ak |
Causes of the rise of nationalism on india |
literära begreppbegrepp svenska 2 |
Frans |
interaction motricité lefevbre CM |
mariia |
PhysicsPhysics[Materials] |
glosor |
SCIENCE |
DG |
6008 IT GovernanceExam Practice |
CHM 7-9 |
6008 The NIST FrameworkExam Practice |
biology |
Labratory Equipment |
WHIMIS |
Prendre |
faire |
aller |
Être |
Anatomie - examen pratique IIIexamen au lab |
Avoir |
mine |
begrepp |
glosor kap 14 |
nomenclature |
Myanmarကဗျာ ခက်ဆစ် |
show me |
PSYCH 340: Chapter 2Exam on February 14, 2024 |
Geometry Test |
10 premiers verbes irreguliers_5eme_Madame Gravereaux Benoit_ |
PSYCH 340: Chapter 1Exam on Feb 12, 2024 |
M&MBegrippen |
no läxa genetik |
The Spleen Channel of Foot Taiyin |
The Stomach Channel of Foot Yangming |
The Large Intestine Channel of Hand Yangming |
DT 5 - ÖNHEpistaxis
Fiber laryngoskopi
Dix Hallpike / Epleys manöver |
science |
measurement theory |
social psychology |
pharmaco |
limbiska systemetlimbiska systemet |
Organic Synthesis HT |
Myanmarစကားပြေ ခက်ဆစ် |
Myanmarရေးသူ နှင့် စာပေအမျိုးအစား |
de 12 kranialnervernapå svenska och latin |
General Knowledge |
Earth Science |
Real world mathMath you will encounter in real life scenarios. |
Algebra |
Algebra Basics / Pre-algebra |
Foundational Math |
Muscoloskeletal system |
3 Times Tables- SAM |
2 Times Tables- SAM |
Waves Quiz |
biologi - genetik |
TAW knowledge Test 1 |
AK topo - copy |
AK topo |
les cités romaines r |
Djurvårdare |
JW359 Real estate vocabulary terms for 2024 |
Biology Paper 2-The Nervous system |
Biology Paper 2- Homeostasis and Response |
no |
Bygg prov F1Prov |
UE7-l'empathie |
sj judet |
computer networks - vocsWHAT IS COMPUTER NETWORKS?
● it's a group of computers linked to each other that enables the computer to communicate with another computer and share their resources, data, and applications.
● An inter... |
Medieteknik |
Periodic Table of Elements - SymbolsFind the symbol that corresponds to the Element. |
UE7-émotions et tratégies d'adaptation face au stress |
UE7-maladies, traitements: def et représenatations |
Sociology 150 Midterm |
6070 Transport Protoco TCPexam pratice |
Political Spectrum (Socials) |
Kemi |
HISTORY |
Criminal Psychology |
6070 Transport Protocol UDPpratice Questions |
Verbes en espagnol |
Biology questions |
chap 37 de mort |
Physical/Chemical Properties of Matter & Classifying Matter |
phrasal verbs |
Vocabularies |
Psykologi |
Ak paragraaf 1 |
Business Marketing Aim B |
perfect squares |
Chapter 1 - Economic ModelsMicroeconomic Theory - Nicholson & Snyder |
Renal |
sport test |
Begrepp, religion sida 64-65 |
research methods |
Biology key words |
CLA Theorist's |
GLOSORRRRRRRRRRRRRRRRRRRRRRR!!!!!!!!!!!!!!!!!!!!!!!! |
KNSS 307 Developmentof manipulate skills |
Business Marketing Aim A |
entreprenuership test 1 |
Travel- Unit 2 Global Destinations |
citostatici (bez hormona) |
Atomic Structure |
ionen scheikundeionen |
UE7- les comportements addictifs |
subject 3 essay from BAC romana |
romanaceva |
Philo 11 |
UE7- dvlp personnalité |
Biology Definitions Study Guide |
CHILE |
Kennistoets |
ARGENTINA |
lektion2 |
politik - kopiakk |
verbs |
BIO Unit 2 |
INGLES VERBOSaprender |
VCAB FOR QUIZ |
A330-300 |
Income from House Property |
Income from salary |
english |
Spanish |
gross negligence manslaughter |
gross negligence manslaughter |
daily expressions |
Microbiology studying |
voc 3.3 |
US révision Dossier 2 Thème 1IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII |
USA |
Spanska prov 2 |
Spanska prov |
RE Islam revision |
antituberkulotici, antimikotici, antivirotici (bez hep c, covid i ostali) |
chemical changes |
6001 test practicepratice |
NO |
eduacion fisica |
HESI VOCAB🤍 |
Income tax rates |
les mots d'origine |
Scope of Total Income |
Antigone original ideas for A* |
interior design 4 |
Antigone Context |
Antigone Terminology |
HT (Critic's quotes) |
kap 5 meningar |
GS BegrippenToets Periode 3 |
Income tax Intro |
Entrep |
japanese |
Family JapLearning Japanese, Using These flash Cards To help :)) |
Etnicitet sociologi |
electricity |
are u a good pookie?!?jj |
Biologi 5.4 Ekosystemen + 5.5 Hållbar utvEkosystem |
Ch 4-6 |
sociologi |
Développement de la personne |
reading exam |
GermanGerman flashcards for ks3 |
so läxa protestantiska kyrkan |
socail deffinitions |
so läxa ortodoxa kyrkan |
anthro week 5 quiz |
Production systems |
r |
accounting 1-3 |
etre |
avoir |
Muscle Tissue |
körkort teori |
hjärnloben och dess funktionhjärnan består av 3 delar, storhjärnan lillhjärnan och hjätnstammen och de olika delarna styr olika funktioner. |
stora testet |
CFPFundamentals of Financial Planning |
engels parsing sentences |
so läxa katolska kyrkan |
Weber, Marx, Durkheim, Addams, Mead, Simmel, Du Bois |
fil |
biology |
HjärnloberNamn på loberna på svenska och latin |
DT 5 - LuftvägBasala
LMA
ETT
Criciotomi
Främmande kropp |
BIO 112L EKG |
french 2.2 |
Job interwiew |
action words |
places |
Health Science Quiz |
Chap.2 Psycho |
Jainism Terms |
travels |
ES : SVT |
Nervous System - Cell Biology Semester 2 |
english termanology |
english |
english macbeth |
history renaissance medicine |
grammatica h3 |
numbers |
spaans zinnen h3 |
plural |
Frans Chapitre 3 bron F 1v2 |
Frans Chapitre 3 bron E 1v2 |
Ecology and Populations - Biodiversity semester 2 |
allemend |
s |
cree words |
History |
idrot prov |
kemi läxförhöre |
Met (Pressure levels) |
cree locatives |
cree diminutives |
Inför fysik-prov (kapitel 6) - |
hkk glosor |
shop infrmantion |
i pasti e il cibo |
Interior design 3 |
Spanska kap 5, stavning |
Spanska |
Fonctions 2 |
Fonctions des mots |
Natures de mots |
Exodoncia |
Cx Bucal |
musicmusic |
Frida Kahlo |
forensics |
poetic methods |
englsihmeaning of volta |
English vocab |
english words |
def of stuff |
history |
CSI 1terminology |
Het regelmatige werkwoord -er Frans |
Manuel |
german 16 |
Verbet FAIRE (options) |
Verbet FAIRE |
possessiva pronomen |
1.8 |
comp sup irreg |
e |
ordtest 15/2 |
6076 Classification and PrioritizationExam Prepartion |
words |
12 eisen requirements |
Frans blokje B |
antibiotici |
Ten Principles of Economics |
elements |
Civil Aviation Regulations |
PSYC 105 midterm 1 |
HHA II Midterm |
hkk |
Theory test |
Bioenergetics, Glycolysis, Krebs cycle+ Electron Transport chain- Biochemistry Semester 2 |
Social Studies |
Spiritualiteit les 5 |
6076 Document object modelDOM |
La découverte du nouveau monde |
Koine Greek Participle of ειμι |
Frans blokje A |
Synonyms |
Gen Info |
mark up languages |
Advanced accounts |
Populära barnspel |