Ovido
Lingua
  • Inglese
  • Spagnolo
  • Francese
  • Portoghese
  • Tedesco
  • Italiano
  • Olandese
  • Svedese
Testo
  • Maiuscole

Utente

  • Accedi
  • Crea account
  • Passa a Premium
Ovido
  • Home
  • Accedi
  • Crea account

cyber security 6

Which device is connected to a port on a switch in order to receive network traffic?

Passive IDS

A mail gateway can have many functions
Which choice is NOT one of those functions?

Require full tunnel

One way to secure data is through Data Loss Prevention (DLP). Which of the choices is not a data type protected by DLP?

Data-to-disclose

Which of the DLP sensor choices requires communication with the DLP server?

DLP agent

Which of the following devices can identify the application that send packets and then make decisions about filtering based on it?

application-based firewall

Which of the following is a multipurpose security device?

Unified Threat
Management (UTM)

Which is the most secure type of firewall?

stateful packet filtering

Which device is easiest for an

attacker to take advantage of to


capture and analyze packets?

hub

Which of these would NOT be a filtering mechanism found in a firewall ACL rule?

date

Which statement regarding a demilitarized zone (DMZ) is NOT true?

It contains servers that are a & used only by internal network users.

Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the
organization's secure intranet.

Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?

A bridge could permit access to the secure wired network from the unsecured wireless network

Which of the following CANNOT be used to hide information about the internal network?

a protocol analyzer

Which of these is NOT used in scheduling a load balancer?

The IP address of the destination packet

Sebastian was explaining to his supervisor why the enterprise needed to implement port security.
His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred.

Which of the following was NOT an answer that was given by Sebastian?

Cause the device to enter a fail-open mode.

Which function does an Internet content filter NOT perform?

intrusion detection

Which device watches for attacks and sounds an alert only when one occurs?

network intrusion
detection system (NIDS)

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?

router

Which statement about network address translation (NAT) is true?

It removes private addresses when the packet leaves the network.

Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch.
What would Francisco say?

Once the MAC address table is full the switch functions like a network hub.

Raul was asked to configure the
VPN to preserve bandwidth. Which configuration would he choose?

Split tunnel

In which of the following configurations are all the load balancers always active?

Active-active

How does network address translation (NAT) improve security?

It discards unsolicited packets.

What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?

A NIPS can take actions more quickly to combat an attack.

Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?

Once the MAC address table is full the switch functions like a network hub.

What kind of attack is performed by

an attacker who takes advantage of


the inadvertent and unauthorized


access built through three


succeeding systems that all trust one

another?

privilege escalation

substitutes DNS addresses so that the computer is automatically redirected to another device?

DNS poisoning

Which of these is NOT a DoS attack?

push flood

Why are extensions, plug-ins, and add-ons considered to be security risks?

They have introduced vulnerabilities in browsers.

Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about?

Privilege escalation

Which action cannot be performed through a successful SQL injection attack?

reformat the web application server's hard drive

What is the difference between a
DoS and a DDoS attack?

DoS attacks use fewer computers than DDoS
attacks

What type of attack involves manipulating third-party ad networks?

Malvertising

An attacker who manipulates the maximum size of an integer type would be performing what kind of attack?

integer overflow

Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser?

Plug-ins

Olivia was asked to protect the system from a DNS poisoning attack.
What are the locations she would need to protect?

Host table and external
DNS server

What is a session token?

a random string assigned

by a web server

A replay attack does what ?

makes a copy of the transmission for use at a
later time

Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks?

Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.

Which of these is not a DoS attack?

push flood

John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing?

XSS

Which attack intercepts communications between a web
browser and the underlying computer?

man-in-the-browser
(MITB)

What is the basis of an SQL injection attack?

to insert SQL statements through unfiltered user input

Which attack uses the user's web browser settings to impersonate that user?

XSRF

Attackers who register domain names that are similar to legitimate domain names are performing what?

URL hijacking

What type of attack intercepts legitimate communication and forges a fictitious response to the sender?

MITM

What hardware based solutions are measures for fault tolerance?
(Choose all that apply.)

RAID
Clustering

Load balancing

To increase fault-tolerance, the security administrator for Corp.com has installed an active/passive firewall cluster where the second firewall is held in reserve in case of primary firewall failure. Stateful firewall inspection is being used in the firewall implementation.
There have been numerous reports of dropped connections with external clients. Which of the following is MOST likely the cause of this problem?

Inbound packets are traversing the active firewall and return traffic is being sent through the passive firewall

Quiz
Homework
noah
English
acid/bases
Meningar
6008 EthicsExam Practice
Kemi prov frågor
6008 Steps in the Audit Life CycleExam Preparation
Korea 1
6008 Business Impact AnalysiExam Practice
Business formulae
Juridik inför tenta
mouvement circulaire
6008 Risk AssessmentExam Practice
cyber security 4 & 5
privatjuridik fastighetsrättkj
Vocabulary
1. Divers modes d’alimentation des animaux Les divers modes d’alimentation des a
DT 5 - ProcedursederingProcedursedering m läkemedel
SYDAFRIKA
ogl202 - kopia
kut ak twee dagen van tevoren 😊kaulo ak
Causes of the rise of nationalism on india
literära begreppbegrepp svenska 2
Frans
interaction motricité lefevbre CM
mariia
PhysicsPhysics[Materials]
glosor
SCIENCE
DG
6008 IT GovernanceExam Practice
CHM 7-9
6008 The NIST FrameworkExam Practice
biology
Labratory Equipment
WHIMIS
Prendre
faire
aller
Être
Anatomie - examen pratique IIIexamen au lab
Avoir
mine
begrepp
glosor kap 14
nomenclature
Myanmarကဗျာ ခက်ဆစ်
show me
PSYCH 340: Chapter 2Exam on February 14, 2024
Geometry Test
10 premiers verbes irreguliers_5eme_Madame Gravereaux Benoit_
PSYCH 340: Chapter 1Exam on Feb 12, 2024
M&MBegrippen
no läxa genetik
The Spleen Channel of Foot Taiyin
The Stomach Channel of Foot Yangming
The Large Intestine Channel of Hand Yangming
DT 5 - ÖNHEpistaxis Fiber laryngoskopi Dix Hallpike / Epleys manöver
science
pharmaco
limbiska systemetlimbiska systemet
Organic Synthesis HT
Myanmarစကားပြေ ခက်ဆစ်
Myanmarရေးသူ နှင့် စာပေအမျိုးအစား
de 12 kranialnervernapå svenska och latin
General Knowledge
Earth Science
Real world mathMath you will encounter in real life scenarios.
Algebra
Algebra Basics / Pre-algebra
Foundational Math
Muscoloskeletal system
3 Times Tables- SAM
2 Times Tables- SAM
Waves Quiz
biologi - genetik
TAW knowledge Test 1
AK topo - copy
AK topo
les cités romaines r
Djurvårdare
JW359 Real estate vocabulary terms for 2024
Biology Paper 2-The Nervous system
Biology Paper 2- Homeostasis and Response
no
Bygg prov F1Prov
UE7-l'empathie
sj judet
computer networks - vocsWHAT IS COMPUTER NETWORKS? ● it's a group of computers linked to each other that enables the computer to communicate with another computer and share their resources, data, and applications. ● An inter...
Medieteknik
Periodic Table of Elements - SymbolsFind the symbol that corresponds to the Element.
UE7-émotions et tratégies d'adaptation face au stress
UE7-maladies, traitements: def et représenatations
Sociology 150 Midterm
6070 Transport Protoco TCPexam pratice
Political Spectrum (Socials)
Kemi
HISTORY
Criminal Psychology
6070 Transport Protocol UDPpratice Questions
Verbes en espagnol
Biology questions
chap 37 de mort
Physical/Chemical Properties of Matter & Classifying Matter
phrasal verbs
Vocabularies
Psykologi
Ak paragraaf 1
Business Marketing Aim B
perfect squares
Chapter 1 - Economic ModelsMicroeconomic Theory - Nicholson & Snyder
Renal
sport test
Begrepp, religion sida 64-65
research methods
Biology key words
CLA Theorist's
GLOSORRRRRRRRRRRRRRRRRRRRRRR!!!!!!!!!!!!!!!!!!!!!!!!
KNSS 307 Developmentof manipulate skills
Business Marketing Aim A
entreprenuership test 1
Travel- Unit 2 Global Destinations
citostatici (bez hormona)
Atomic Structure
ionen scheikundeionen
UE7- les comportements addictifs
subject 3 essay from BAC romana
romanaceva
Philo 11
UE7- dvlp personnalité
Biology Definitions Study Guide
CHILE
Kennistoets
ARGENTINA
lektion2
politik - kopiakk
verbs
BIO Unit 2
INGLES VERBOSaprender
VCAB FOR QUIZ
A330-300
Income from House Property
Income from salary
english
Spanish
gross negligence manslaughter
gross negligence manslaughter
daily expressions
Microbiology studying
voc 3.3
USA
Spanska prov 2
Spanska prov
RE Islam revision
antituberkulotici, antimikotici, antivirotici (bez hep c, covid i ostali)
chemical changes
6001 test practicepratice
NO
eduacion fisica
HESI VOCAB🤍
Income tax rates
les mots d'origine
Scope of Total Income
Antigone original ideas for A*
interior design 4
Antigone Context
Antigone Terminology
HT (Critic's quotes)
kap 5 meningar
GS BegrippenToets Periode 3
Income tax Intro
Entrep
japanese
Family JapLearning Japanese, Using These flash Cards To help :))
Etnicitet sociologi
electricity
are u a good pookie?!?jj
Biologi 5.4 Ekosystemen + 5.5 Hållbar utvEkosystem
Ch 4-6
sociologi
Développement de la personne
reading exam
GermanGerman flashcards for ks3
so läxa protestantiska kyrkan
socail deffinitions
so läxa ortodoxa kyrkan
anthro week 5 quiz
Production systems
r
accounting 1-3
etre
avoir
Muscle Tissue
körkort teori
hjärnloben och dess funktionhjärnan består av 3 delar, storhjärnan lillhjärnan och hjätnstammen och de olika delarna styr olika funktioner.
stora testet
CFPFundamentals of Financial Planning
engels parsing sentences
so läxa katolska kyrkan
Weber, Marx, Durkheim, Addams, Mead, Simmel, Du Bois
fil
biology
HjärnloberNamn på loberna på svenska och latin
DT 5 - LuftvägBasala LMA ETT Criciotomi Främmande kropp
BIO 112L EKG
french 2.2
action words
places
Health Science Quiz
Chap.2 Psycho
Jainism Terms
travels
ES : SVT
Nervous System - Cell Biology Semester 2
english termanology
english
english macbeth
history renaissance medicine
grammatica h3
numbers
spaans zinnen h3
plural
Frans Chapitre 3 bron F 1v2
Frans Chapitre 3 bron E 1v2
Ecology and Populations - Biodiversity semester 2
allemend
s
cree words
History
idrot prov
kemi läxförhöre
Met (Pressure levels)
cree locatives
cree diminutives
Inför fysik-prov (kapitel 6) -
hkk glosor
shop infrmantion
i pasti e il cibo
Interior design 3
Spanska kap 5, stavning
Spanska
Fonctions 2
Natures de mots
Exodoncia
Cx Bucal
musicmusic
Frida Kahlo
forensics
poetic methods
englsihmeaning of volta
English vocab
english words
def of stuff
history
CSI 1terminology
Het regelmatige werkwoord -er Frans
Manuel
german 16
Verbet FAIRE (options)
Verbet FAIRE
possessiva pronomen
1.8
comp sup irreg
e
ordtest 15/2
6076 Classification and PrioritizationExam Prepartion
words
12 eisen requirements
Frans blokje B
antibiotici
Ten Principles of Economics
elements
Civil Aviation Regulations
PSYC 105 midterm 1
HHA II Midterm
hkk
Theory test
Bioenergetics, Glycolysis, Krebs cycle+ Electron Transport chain- Biochemistry Semester 2
Social Studies
Spiritualiteit les 5
6076 Document object modelDOM
La découverte du nouveau monde
Koine Greek Participle of ειμι
Frans blokje A
Synonyms
Gen Info
mark up languages
Advanced accounts
Populära barnspel