Adblocker Detected
Quizack provides Online Quiz and Practice MCQs for Free. Please disable your Ad-Blocker so we can earn from ads and keep this project alive.
1. ____ is data before any encryption has been performed.
2. When a hacker takes over a TCP session between two machines - also known as session hijacking - foiled by the use of encrypted sessions
3. Examines content passing through and makes a decision on the data based on a set of criteria - normal uses email filtering and web browsing
4. An attack where an attacker captures sensitive information and sends it again later in an attempt to replicate the transaction
5. Connects two or more subnets - determines the best path to forward packets based on packet header and forwarding table information
6. A method - used by switches and email servers - of delivering messages which are temporarily held by an intermediary before being sent to their final destination
7. Monitors network traffic to identify possible attacks
8. Promiscuous NIC to sniff passing traffic - admin NIC to send alerts to centralized management system
9. Ping flooding - ping of death - smurf - fraggle - SYN flood - land - teardrop - email flood
10. Cable with copper core - has no physical transmission security and is easy to tap - 10mbps - maximum length 500 meters
11. Malicious insiders - connections that bypass the firewall (i.e. IM) - encrypted traffic/tunneling - social engineering - physical access are missed by ___________
12. An attack where fragmented UDP packets with odd offset values are sent to the victim - when the OS attempts to rebuild the fragments they overwrite each other and cause confusion
13. A level 3 firewall that remembers / tracks network connections - maintains a state table - distinguish which side of a firewall a connection was initiated - higher security
14. Firewall with several NICs connected to different networks
15. A set of rules computers use to communicate with each other across a network
16. Blocks all traffic from passing through the firewall except for traffic that is explicitly allowed - also known as restrictive access - best practice
17. Unauthenticated connections - creating the potential for a successful connection as an anonymous user
18. Firewall that intercepts and inspects messages before delivering them - placed between trusted and untrusted networks - degrade network traffic - also know as application gateway
19. Examines a entire packet and determines action based on a complex set of rules
20. Level 2 firewall often used to filter web traffic
21. Most common DMZ implementation using three firewall interfaces (internet - intranet - DMZ)
22. Acts as an organizations internal phone system
23. IP spoofing attack where the attacker can monitor packets and participate in bidirectional communication
24. One device per network segment - does not use local system resources - can't examine encrypted traffic - OS independent - less expensive
25. Session hijacking countermeasure
26. Evolved from IDS - monitors network traffic - detects and responds to attack on network
27. A variation of a smurf attack using UDP
28. Attempt to block service or reduce activity by overloading the victim machine with ping requests
29. A person or program masquerades as another by presenting false information to gain an illegitimate advantage
30. Variation of the SYN flood where SYN packets are spoofed to have the same source and destination IP address and port
31. Firewall that communicates directly with a perimeter router and the internal network - 2 NICs - screens internal traffic
Comptia Security +: Os Hardening
Comptia Security +: Wireless Security
CRISC Information Systems Control
ISTQB
MCSE
MSITP
Related MCQ's