Professional Documents
Culture Documents
)
buffer overflow
ping sweep
port redirection
trust exploitation
port scan
Internet information query
Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)
2 virus scanning
data encryption
anti-spoofing technologies
intrusion protection systems
applying user authentication
3 Which access attack method involves a software program attempting to discover a system password by us
electronic dictionary?
buffer overflow attack
port redirection attack
Denial of Service attack
brute-force attack
IP spoofing attack
packet sniffer attack
5 Which phase of worm mitigation requires compartmentalization and segmentation of the network to slow
or stop the worm and prevent currently infected hosts from targeting and infecting other systems?
containment phase
inoculation phase
quarantine phase
treatment phase
Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their com
8 screens. What could be a reason that computers are displaying these random graphics?
An access attack has occurred.
A virus has infected the computers.
A DoS attack has been launched against the network.
The computers are subject to a reconnaissance attack.
11 A disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. W
type of network attack does this describe?
Denial of Service
port redirection
reconnaissance
trust exploitation
What are the basic phases of attack that can be used by a virus or worm in sequential order?
14 paralyze, probe, penetrate, persist, and propagate
probe, penetrate, persist, propagate, and paralyze
penetrate, persist, propagate, paralyze, and probe
persist, propagate, paralyze, probe, and penetrate
Which characteristic best describes the network security Compliance domain as specified by the ISO/IEC
17 the integration of security into applications
an inventory and classification scheme for information assets
the restriction of access rights to networks, systems, applications, functions, and data
the process of ensuring conformance with security information policies, standards, and regulations
What are the three major components of a worm attack? (Choose three.)
19 enabling vulnerability
infecting vulnerability
payload
penetration mechanism
probing mechanism
propagation mechanism
A network administrator detects unknown sessions involving port 21 on the network. What could be caus
21 security breach?
An FTP Trojan Horse is executing.
A reconnaissance attack is occurring.
A denial of service attack is occurring.
Cisco Security Agent is testing the network.
22 Which phase of worm mitigation involves terminating the worm process, removing modified files or syst
settings that the worm introduced, and patching the vulnerability that the worm used to exploit the system
containment
inoculation
quarantine
treatment