1. ________ is one method of thwarting dos attacks by dropping all ip packets from an attacker.
2. ____ is data before any encryption has been performed.
3. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
4. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
5. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
6. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
7. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
8. Monitors network traffic to identify possible attacks
9. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
10. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
11. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
12. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
13. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
14. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
15. Firewall with several NICs connected to different networks
16. A set of rules computers use to communicate with each other across a network
17. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
18. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
19. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
20. Examines a entire packet and determines action based on a complex set of rules
21. Level 2 firewall often used to filter web traffic
22. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
23. Acts as an organizations internal phone system
24. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
25. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
26. Session hijacking countermeasure
27. Evolved from IDS - monitors network traffic - detects and responds to attack on network
28. A variation of a smurf attack using UDP
29. Attempt to block service or reduce activity by overloading the victim machine with ping requests
30. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
31. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
32. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
Comptia Security +: Os Hardening
Comptia Security +: Wireless Security
CRISC Information Systems Control
ISTQB
MCSE
MSITP
Related MCQ's