Ktchep8

21 Questions | Total Attempts: 54

SettingsSettingsSettings
Please wait...
Network Security Quizzes & Trivia

Questions and Answers
  • 1. 
     A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
    • A. 

      Trojan horse

    • B. 

      Brute force

    • C. 

      Ping of death

    • D. 

      SYN flooding

  • 2. 
    What environment would be best suited for a two-firewall network design?
    • A. 

      large corporate environment

    • B. 

      A home environment with 10 or fewer hosts

    • C. 

      A home environment that needs VPN access

    • D. 

      A smaller, less congested business environment

  • 3. 
    3. While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
    • A. 

      Worm

    • B. 

      Virus

    • C. 

      Trojan horse

    • D. 

      Denial of service

  • 4. 
    Which two statements are true concerning anti-spam software? (Choose two.) Anti-spam software can be loaded on either the end-user PC or the ISP server, but not both.
    • A. 

      When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.

    • B. 

      Installing anti-spam software should be a low priority on the network.

    • C. 

      Even with anti-spam software installed, users should be careful when opening e-mail attachments.

    • D. 

      Virus warning e-mails that are not identified as spam via anti-spam software should be forwarded to other users immediately.

  • 5. 
    What type of advertising is typically annoying and associated with a specific website that is being visited?
    • A. 

      Adware

    • B. 

      Popups

    • C. 

      Spyware

    • D. 

      Tracking cookies

  • 6. 
    What part of the security policy states what applications and usages are permitted or denied? 
    • A. 

      Dentification and authentication

    • B. 

      Remote access

    • C. 

      Acceptable use

    • D. 

      Incident handling

  • 7. 
    To which part of the network does the wireless access point part of a Linksys integrated router connect?
    • A. 

      DMZ

    • B. 

      External

    • C. 

      Internal

    • D. 

      A network other than the wired network

  • 8. 
    Identify three techniques used in social engineering.
    • A. 

      Fishing

    • B. 

      Vishing

    • C. 

      Phishing

    • D. 

      Spamming

    • E. 

      Pretexting

    • F. 

      Junk mailing

  • 9. 
    What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail? 
    • A. 

      Brute force

    • B. 

      Spam

    • C. 

      Spyware

    • D. 

      Tracking cookies

  • 10. 
    Which acronym refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices? 
    • A. 

      SPI

    • B. 

      DMZ

    • C. 

      ISR

    • D. 

      ISP

  • 11. 
    During a pretexting event, how is a target typically contacted?
    • A. 

      By e-mail

    • B. 

      By phone

    • C. 

      In person

    • D. 

      Through another person

  • 12. 
    Refer to the graphic. What is the purpose of the Internet Filter option of Filter IDENT (Port 113.  on the Linksys integrated router?
    • A. 

      To require a user ID and password to access the router

    • B. 

      To prevent outside intruders from attacking the router through the Internet

    • C. 

      To require a pre-programmed MAC address or IP address to access the router

    • D. 

      To disable tracking of internal IP addresses so they cannot be spoofed by outside devices

  • 13. 
    What is a major characteristic of a Worm?
    • A. 

      Malicious software that copies itself into other executable programs

    • B. 

      Tricks users into running the infected software

    • C. 

      A set of computer instructions that lies dormant until triggered by a specific event

    • D. 

      Exploits vulnerabilities with the intent of propagating itself across a network

  • 14. 
    What term is used to describe a dedicated hardware device that provides firewall services?
    • A. 

      Server-based

    • B. 

      Integrated

    • C. 

      Personal

    • D. 

      Appliance-based

  • 15. 
    What best practice relates to wireless access point security?
    • A. 

      Activation of a popup stopper

    • B. 

      A change of the default IP address

    • C. 

      An update in the antivirus software definitions

    • D. 

      Physically securing the cable between the access point and client

  • 16. 
    Which statement is true about port forwarding within a Linksys integrated router?
    • A. 

      Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.

    • B. 

      Only external traffic that is destined for specific internal ports is denied. All other traffic is permitted.

    • C. 

      Only internal traffic that is destined for specific external ports is permitted. All other traffic is denied.

    • D. 

      Only internal traffic that is destined for specific external ports is denied. All other traffic is permitted.

  • 17. 
    What statement is true about security configuration on a Linksys integrated router?
    • A. 

      A DMZ is not supported.

    • B. 

      The router is an example of a server-based firewall.

    • C. 

      The router is an example of an application-based firewall.

    • D. 

      Internet access can be denied for specific days and times.

  • 18. 
    What is one function that is provided by a vulnerability analysis tool?
    • A. 

      It provides various views of possible attack paths.

    • B. 

      It identifies missing security updates on a computer.

    • C. 

      It identifies wireless weak points such as rogue access points.

    • D. 

      It identifies all network devices on the network that do not have a firewall installed.

    • E. 

      It identifies MAC and IP addresses that have not been authenticated on the network.

  • 19. 
     Which statement is true regarding anti-virus software? 
    • A. 

      Only e-mail programs need to be protected.

    • B. 

      Only hard drives can be protected.

    • C. 

      Only after a virus is known can an anti-virus update be created for it.

    • D. 

      Only computers with a direct Internet connection need it.

  • 20. 
    Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
    • A. 

      Periodically update anti-virus software.

    • B. 

      Be aware of normal network traffic patterns.

    • C. 

      Periodically update the host operating system.

    • D. 

      Activate the firewall on a Linksys integrated router.

    • E. 

      Configure login permissions on the integrated router.

    • F. 

      Disable the wireless network when a vulnerability analysis is being performed. Disable the wireless network when a vulnerability analysis is being performed. Disable the wireless network when a vulnerability analysis is being performed. Disable the wireless network when a vulnerability analysis is being performed.

  • 21. 
    Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
    • A. 

      It prevents packets based on the application that makes the request.

    • B. 

      It allows packets based on approved internal MAC or IP addresses.

    • C. 

      It requires that packets coming into the router be responses to internal host requests.

    • D. 

      It translates an internal address or group of addresses into an outside, public address.