4.11. Review Questions

  1. Which of the following can be used to monitor a network for unauthorized activity? (Choose two.)

    1. Network sniffer

    2. NIDS

    3. HIDS

    4. VPN

  2. You're the administrator for Acme Widgets. After attending a conference on buzzwords for management, your boss informs you that an IDS should be up and running on the network by the end of the week. Which of the following systems should be installed on a host to provide IDS capabilities?

    1. Network sniffer

    2. NIDS

    3. HIDS

    4. VPN

  3. Which of the following is an active response in an IDS?

    1. Sending an alert to a console

    2. Shunning

    3. Reconfiguring a router to block an IP address

    4. Making an entry in the security audit file

  4. A junior administrator bursts into your office with a report in his hand. He claims that he has found documentation proving that an intruder has been entering the network on a regular basis. Which of the following implementations of IDS detects intrusions based on previously established rules that are in place on your network?

    1. MD-IDS

    2. AD-IDS

    3. HIDS

    4. NIDS

  5. Which IDS function evaluates data collected from sensors?

    1. Operator

    2. Manager

    3. Alert

    4. Analyzer

  6. During the creation of a new set of policies and procedures for network usage, your attention turns to role definition. By default, which of the following roles is responsible for reporting the results of an attack to a system operator or administrator?

    1. Alert

    2. Manager

    3. Analyzer

    4. Data source

  7. What is a system that is intended or designed to be broken into by an attacker called?

    1. Honeypot

    2. Honeybucket

    3. Decoy

    4. Spoofing system

  8. An emergency meeting of all administrators has been called at MTS. It appears that an unauthorized user has been routinely entering the network after hours. A response to this intrusion must be formulated by those assembled. What is the process of formulating a reaction to a computer attack officially called?

    1. Incident response

    2. Evidence gathering

    3. Entrapment

    4. Enticement

  9. Which of the following is not a part of an incident response?

    1. Identification

    2. Investigating

    3. Entrapment

    4. Repairing

  10. Which protocol is mainly used to enable access to the Internet from a mobile phone or PDA?

    1. WEP

    2. WTLS

    3. WAP

    4. WOP

  11. Which protocol operates on 2.4GHz and has a bandwidth of 1Mbps or 2Mbps?

    1. 802.11

    2. 802.11a

    3. 802.11b

    4. 802.11g

  12. You're outlining your plans for implementing a wireless network to upper management. Suddenly, a paranoid vice president brings up the question of security. Which protocol was designed to provide security to a wireless network and can be considered equivalent to the security of a wired network?

    1. WAP

    2. WTLS

    3. WPA2

    4. IR

  13. Which of the following is a primary vulnerability of a wireless environment?

    1. Decryption software

    2. IP spoofing

    3. A gap in the WAP

    4. Site survey

  14. As the administrator for MTS, you want to create a policy banning the use of instant messaging, but you're receiving considerable opposition from users. To lessen their resistance, you decide to educate them about the dangers inherent in IM. To which of the following types of attacks is IM vulnerable?

    1. Malicious code

    2. IP spoofing

    3. Man-in-the-middle attacks

    4. Replay attacks

  15. What is the process of identifying the configuration of your network called?

    1. Footprinting

    2. Scanning

    3. Jamming

    4. Enumeration

  16. During the annual performance review, you explain to your manager that this year you want to focus on looking at multiple sources of information and determining what systems your users may be using. You think this is a necessary procedure for creating a secure environment. What is the process of identifying your network and its security posture called?

    1. Footprinting

    2. Scanning

    3. Jamming

    4. Enumeration

  17. When an event is detected when it is happening, it is being detected in:

    1. Present time

    2. Here-and-now

    3. Active time

    4. Real time

  18. A user calls with a problem. Even though she has been told not to use instant messaging, she has been doing so. For some reason, she is now experiencing frequent interrupted sessions. You suspect an attack and inform her of this. What is the process of disrupting an IM session called?

    1. Jamming

    2. Broadcasting

    3. Incident response

    4. Site survey

  19. You've just received a call from an IM user in your office who visited an advertised website. The user is complaining that his system is unresponsive and about a million web browser windows have opened on his screen. What type of attack has your user experienced?

    1. DoS

    2. Malicious code

    3. IP spoofing

    4. Site survey

  20. A fellow administrator is reviewing the log files for the month when he calls you over. A number of IDS entries don't look right to him, and he wants to focus on those incidents. Which of the following terms best describes an occurrence of suspicious activity within a network?

    1. Event

    2. Occurrence

    3. Episode

    4. Enumeration

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.0.61