Term
What process is a thorough examination of a network’s vulnerabilities that every organization should conduct to assess its security risks? |
|
Definition
|
|
Term
What can a company that is accredited by an agency that sets security standards perform for your network? |
|
Definition
|
|
Term
If you are examining a system to look for weaknesses that could lead to compromised information, what are you looking for? |
|
Definition
|
|
Term
A hacker has discovered a system vulnerability and proceeds to exploit it to gain access to the system. The vulnerability is not yet known to the developer so no fix is available. What type of attack is this? |
|
Definition
|
|
Term
A user receives a fraudulent email claiming to need his user name and password to confirm his online bank account. What type of attack has been attempted? |
|
Definition
|
|
Term
An attacker uses an RF transmitter to flood the air waves with wireless traffic; what type of attack has occurred? |
|
Definition
|
|
Term
A flood of ping messages overwhelm a router interface in attempt to deny legitimate users access to a network. What type of attack is occurring? |
|
Definition
|
|
Term
What type of policy does a new employee agree to which explains what they can and cannot do on the network? |
|
Definition
|
|
Term
What type of groups are centrally managed by Active Directory and provide a method for administrators to assign rights to users? |
|
Definition
|
|
Term
Which of the following employs a set of rules which determine the level and type of access granted to a device when it joins a network? |
|
Definition
|
|
Term
When deploying NAC, what should you install on a system to get a one–time posture assessment of that system? |
|
Definition
|
|
Term
In a NAC–protected network, where should a device that does not meet compliance requirements be placed? |
|
Definition
|
|
Term
A packet arrives on a router interface that has an ACL. The packet is examined and does not meet any of the ACL rules. What happens next? |
|
Definition
|
|
Term
Which statement allows ICMP packets from any address to a server with IP address 10.1.1.1? |
|
Definition
access–list icmp_acl permit icmp any host 10.1.1.1 |
|
|
Term
What technique might an IDS use so that it can monitor all traffic carried by a switch? |
|
Definition
|
|
Term
Which of the following protects a network by monitoring traffic and creating alerts and is usually found in the DMZ? |
|
Definition
|
|
Term
Which type of device can detect threats to the network and can take preventive measures to prevent the threat from reaching its destination? |
|
Definition
|
|
Term
What type of firewall can inspect each packet to determine if it is part of a currently active connection? |
|
Definition
|
|
Term
What type of malware runs in the place of the computer’s normal system files when the computer starts? |
|
Definition
|
|
Term
What type of malware can change its characteristics each time it is transferred to a new system? |
|
Definition
|
|
Term
Reason: Universally Connected Devices |
|
Definition
Description: Attackers from anywhere in the world can send attacks. |
|
|
Term
Reason: Increased Speed of Attacks |
|
Definition
Description: Attackers can launch attacks against millions of computers within minutes. |
|
|
Term
Reason: Greater sophistication of attacks. |
|
Definition
Description: Attack tools vary their behavior so the same attack appears differently every time. |
|
|
Term
Reason: Availability and Simplicity of Attack Tools |
|
Definition
Description: Attacks no longer limited to highly skilled attackers. |
|
|
Term
Reason: Delays security updating |
|
Definition
Description: Vendors are overwhelmed trying to keep pace updating their products against the latest attacks. |
|
|
Term
Reason: Weak Security Update Distribution |
|
Definition
Description: Many software products lack a means to distribute security updates in a timely fashion. |
|
|
Term
Reason: Distributed Attacks |
|
Definition
Description: Attackers use thousands of computers in an attack against a single computer or network. |
|
|
Term
|
Definition
Users are required to make difficult security decisions with little or no instruction. |
|
|
Term
|
Definition
Description: Forms the security around the data. May be as basic as door locks or as complicated as network security equipment. |
|
|
Term
|
Definition
Description: Those who implement and properly use security products to protect data. |
|
|
Term
Layer: Policies and Procedures |
|
Definition
Description: Plans and policies established by an organization to ensure that people correctly use the products. |
|
|
Term
Which of the choices provided would be considered a critical asset? |
|
Definition
|
|
Term
Why would system software not be considered a critical asset? |
|
Definition
It can be recovered from a system partition. It can be purchased. It is easily replaced. |
|
|
Term
The non-custom type of scan that is available with Windows Defender is a ____ scan. |
|
Definition
|
|
Term
Windows Defender uses alert levels to define potentially unwanted software on your computer. Which of these is NOT an actual level used by Windows Defender to choose how to respond to spyware and other unwanted software? |
|
Definition
|
|
Term
True or False: Windows Defender does NOT report the date of its last system scan. |
|
Definition
|
|
Term
What are three genuine Windows Defender alert item actions? |
|
Definition
Default Action, Ignore, Remove |
|
|
Term
What are NOT genuine Windows Defender alert item actions? |
|
Definition
Move to Virus Vault, Quarantine |
|
|
Term
Which of the choices provided is used to identify malware traits and characteristics? |
|
Definition
|
|
Term
Your office requires badge keys for access. Holding the door for a third party who rushes up quickly behind you is a form of ________ engineering. |
|
Definition
|
|
Term
Which control panel category is used to access Windows Firewall? |
|
Definition
|
|
Term
When viewing the firewall settings for the first time, how is the firewall treating incoming connections that are on the list of allowed programs? |
|
Definition
|
|
Term
At which layer of the OSI model do packet filtering firewalls operate? |
|
Definition
|
|
Term
In its final configured state, what action will be taken on Remote Desktop connection while the computer is on a public network? |
|
Definition
|
|
Term
In its final configured state, what action will be taken on Remote Desktop connection while the computer is on a private network? |
|
Definition
|
|