cyber security chapter 7 flash cards
for both DNS poisoning and arp poisoning involves what?
spoofing attack.
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server.
The server has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?
IPCONFIG
Which command is used in testing and troubleshooting
DNS servers?
nslookup
You are examining the security implications of virtual machines. A condition exists where the virtual machine can potentially harm the host. Which choice describes this?
Escape
You are asked to design a VLAN using a Type 1 Hypervisor. Which technology will you use as a base?
Hardware
Considering the implications of virtual servers on a host, what poses the greatest threat to them?
Hypervisor compromise
You are planning to deploy several patches and updates to a virtual server.
Which step do you take just before implementation?
Take system snapshot.
When preparing a cloud computing security solution for your organization, you implement a "gatekeeper" to guarantee your security policies. Which choice correctly identifies this method of policy enforcement?
CASB
Which type of hypervisor does not run on an underlying operating system?
Type I
Which of the following can be used to prevent a buffer overflow attack?
DEP
Aideen sent an email to her supervisor explaining the Domain Name System
Security Extensions
(DNSSEC). Which of the following statements would Aideen have NOT included in her email?
It can prevent a DNS
transfer attack.
What is the recommended secure protocol for voice and video applications?
Secure Real-time Transport Protocol (SRTP)
Which of these is the most secure protocol for transferring files?
SFTP
Which type of device log contains the most beneficial security data?
Firewall log
Which of the following TCP/ IP protocols do not relate to security?
IP
Which of the following is
NOT a security concern of virtualized environments?
Virtual servers are less expensive than their physical counterparts
Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?
successful logins
What functions of a switch does a software defined network separate?
Control plane and physical plane
Which of the following is
NOT a service model in cloud computing?
Hardware as a Service (HaaS)
Which Domain Name System
(DNS) attack replaces a fraudulent IP address for a symbolic name?
DNS poisoning
Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?
Port mirroring
Which of these is NOT correct about an SSL/TLS accelerator?
It replaces FTP using Secure Sockets Layer (FTPS) as a file transport layer resting "on top" of SSL/TLS.
Which type of cloud is offered to specific organizations that have common concerns?
Community cloud
DNSSEC adds additional and message header information, which can be used to verify that the requested data has not been altered in transmission.
resource records
Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?
On-premises
Network Management
Protocol (SNMP) is considered the most secure?
SNMPv2
Which type of log can provide details regarding requests for specific files on a system?
access log
Which application stores the user's desktop inside a virtual machine that resides
on a server and is accessible from multiple locations?
VDI
Which version of Simple Network Management Protocol (SNMP) is considered the most secure?
SNMPv3