Term
Which UNIX command can be used to show the patches that are installed for a specific software package? |
|
Definition
|
|
Term
How does stateful packet filtering differ from basic packet filtering? |
|
Definition
b. Stateful packet filtering looks at the packets in relation to other packets. |
|
|
Term
Adding more services and applications to a system helps to harden it. |
|
Definition
|
|
Term
Which of the following is NOT a general step in securing a networking device? |
|
Definition
c. Maintaining SNMP community strings Correct |
|
|
Term
Which of the following is NOT an advantage of network-based IDS? |
|
Definition
b. They can reduce false positive rates. |
|
|
Term
A _________ is a more formal, large software update that may address several or many software problems. |
|
Definition
|
|
Term
Windows Defender does all of the following EXCEPT: |
|
Definition
|
|
Term
|
Definition
b. Describe the state of initialization and what system services are operating in a Linux system Correct |
|
|
Term
While NIDS are able to detect activities such as port scans and brute force attacks, it is unable to detect tunneling. |
|
Definition
|
|
Term
Service pack is the term given to a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks. |
|
Definition
|
|
Term
A new breed of IDS that is designed to identify and prevent malicious activity from harming a system. |
|
Definition
|
|
Term
One of the advantages of HIDS is that |
|
Definition
a. They can reduce false-positive rates |
|
|
Term
Only active intrusion detection systems (IDS) can aggressively respond to suspicious activity, whereas passive IDS cannot. |
|
Definition
|
|
Term
Network-based IDS examines activity on a system such, as a mail server or web server. |
|
Definition
|
|
Term
Which UNIX command would you use to change permissions associated with a file or directory? |
|
Definition
|
|
Term
What is the process of establishing a system's security state called? |
|
Definition
|
|
Term
Simple rule sets that are applied to port number and IP addresses are called |
|
Definition
|
|
Term
On a UNIX system, if a file has the permission r-x rw- ---, what permission does the world have? |
|
Definition
|
|
Term
Hotfixes are usually smaller than patches, and patches are usually smaller than service packs. |
|
Definition
|
|
Term
Which of the following is NOT a component of an IDS? |
|
Definition
c. Expert knowledge database |
|
|
Term
What must you do in order to sniff the traffic on all ports on a switch? |
|
Definition
c. Enable port mirroring. |
|
|
Term
Service pack is the term given to a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks. |
|
Definition
|
|
Term
What is the first step in addressing issues with passwords? |
|
Definition
a. The first step in addressing password issues is to create an effective and manageable password policy that both system administrators and users can work with. Correct |
|
|
Term
Only active intrusion detection systems (IDS) can aggressively respond to suspicious activity, whereas passive IDS cannot. |
|
Definition
|
|
Term
Permissions under Linux are the same as for other UNIX-based operating systems. |
|
Definition
|
|
Term
Which of the following is NOT an advantage of network-based IDS? |
|
Definition
b. They can reduce false positive rates. Correct |
|
|
Term
When hardening Mac OS X, the same guidelines for all UNIX systems apply. |
|
Definition
|
|
Term
Which of the following is true of the registry permissions area settings in security templates? |
|
Definition
c. They control who can access the registry and how it can be accessed. |
|
|
Term
Antivirus products do all of the following EXCEPT: |
|
Definition
c. Block network traffic based on policies |
|
|
Term
The security tool that will hide information about the requesting system and make the browsing experience secret is a |
|
Definition
|
|
Term
Hardening applications is similar to hardening operating systems, in that you remove functions that are not needed, restrict access where you can, and make sure the application is up to date with patches. |
|
Definition
|
|
Term
Hostile activity that does not match an IDS signature and goes undetected is called a false positive. |
|
Definition
|
|
Term
The model that most modern intrusion detection systems use is largely based upon a model created by Dorothy Denning and Peter Neumann called: |
|
Definition
c. Intrusion Detection Expert System (IDES) |
|
|
Term
Which of the following is NOT a component of an IDS? |
|
Definition
c. Expert knowledge database |
|
|
Term
An initial baseline should be performed when? |
|
Definition
c. After administrators have finished patching, securing, and preparing a system |
|
|
Term
The nuisance of web pages that automatically appear on top of your current web page can be remedied with |
|
Definition
|
|
Term
Which of the following is the command to stop a service in UNIX? |
|
Definition
|
|
Term
Securing access to files and directories in Solaris is vastly different from most UNIX variants. |
|
Definition
|
|
Term
A sniffer must use a NIC in promiscuous mode; otherwise it will not see all the network traffic coming into the NIC. |
|
Definition
|
|
Term
Which of the following is NOT a UNIX file permission? |
|
Definition
|
|
Term
Network-based IDS examines activity on a system such, as a mail server or web server. |
|
Definition
|
|
Term
The NIDS signature database is usually much larger than that of a host-based system. |
|
Definition
|
|
Term
A sniffer must use a NIC in promiscuous mode; otherwise it will not see all the network traffic coming into the NIC. |
|
Definition
|
|
Term
How does IPS differ from an IDS? |
|
Definition
c. IPS will block, reject, or redirect unwanted traffic; an IDS will only alert. |
|
|
Term
Linux and other operating systems use the _______ command to change the read-write-execute properties of a file or directory. |
|
Definition
|
|
Term
Mac OS X FileVault encrypts files with 3DES encryption. |
|
Definition
|
|