Information Security and Network Management Quiz
16 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does this sample virus code do? #!/bin/bash while: do echo -e "a" sleep 1 done

  • Shuts down the computer after 1 second.
  • Repeatedly restarts the computer.
  • Continuously creates a beep sound every second. (correct)
  • Deletes a file every second.
  • To capture all DNS (domain) traffic on the first Ethernet card, which command should be used?

  • sudo tcpdump -i 127.0.0.1 -p 53
  • sudo tcpdump -i eth0 -A -port 21
  • sudo tcpdump -i localhost -A port 21
  • sudo tcpdump -i eth0 port 53 (correct)
  • A sudden power failure in a data center is categorized as a security event impacting availability.

    True

    Which of the following is an example of a Detection Control in risk management?

    <p>Sounding an alarm to alert security personnel of an intruder.</p> Signup and view all the answers

    What type of network security control protects against IP address spoofing?

    <p>IP Security (IPSec)</p> Signup and view all the answers

    What does the "Plan-Do-Check-Act" (PDCA) model in ISO27001 signify?

    <p>A lifecycle approach to continual improvement in ISMS.</p> Signup and view all the answers

    To allow netcat to listen on the loopback interface on an FTP port, you use the command: nc -l -p ____.

    <p>21</p> Signup and view all the answers

    Match the following commands with their correct descriptions:

    <p>sudo tcpdump -i eth0 port 53 = Captures DNS traffic on the Ethernet interface. nc -l -p 21 = Sets up a listener on the FTP port. #!/bin/bash while: do echo -e &quot;a&quot; sleep 1 done = Outputs 'a' every second. IPSec = Protects against IP spoofing.</p> Signup and view all the answers

    What command captures telnet traffic to and from 10.11.12.3 and saves it to a file?

    <p>tcpdump -i eth0 -w traffic.pcap host 10.11.12.3 and port 23</p> Signup and view all the answers

    The command 'nc -I 127.0.0.1 -p 22' is used to establish a telnet connection.

    <p>False</p> Signup and view all the answers

    What does the given Unix script do?

    <p>Creates a new text file with a random name repeatedly.</p> Signup and view all the answers

    To ensure an ISO image is not corrupted, a ______ file is provided.

    <p>hash</p> Signup and view all the answers

    Which statement correctly describes the goals of security concerning illegitimate users?

    <p>Confidentiality ensures that illegitimate users are denied the ability to read information, while integrity ensures they cannot modify information, and authentication ensures they cannot impersonate legitimate users.</p> Signup and view all the answers

    Type the certutil command to generate an MD5 hash for newlinux.iso.

    <p>certutil -hashfile newlinux.iso MD5</p> Signup and view all the answers

    What is the purpose of the command 'while :' in the Unix script?

    <p>It creates an infinite loop.</p> Signup and view all the answers

    Match the following commands with their respective purpose:

    <p>nc -I 127.0.0.1 -p 22 = Establish a connection on port 22 tcpdump -i eth0 -w traffic.pcap = Capture and save network traffic certutil -hashfile = Generate a file's hash bash = Execute shell scripts</p> Signup and view all the answers

    Study Notes

    Multiple-Choice Questions

    • Question 1: A Unix script repeatedly prints "a" and pauses for 1 second. This script repeatedly restarts the computer.

    • Question 2: To capture all DNS traffic on the first Ethernet card, use sudo tcpdump -i eth0 -A -port 21.

    • Question 3: A financial services company experienced a power failure in its primary data center which caused a system outage. This should be categorized as a security event impacting availability of services.

    • Question 4: An example of a Detection Control in a risk management framework includes sounding an alarm to alert personnel of an intruder.

    • Question 5: IP Security (IPSec) protects against IP address spoofing and TCP session hijacking.

    Additional Questions

    • Question 6: The "Plan-Do-Check-Act" (PDCA) model in ISO27001 is a lifecycle approach to continual improvement in Information Security Management Systems (ISMS).

    • Question 7: To allow Netcat to listen on the loopback interface for FTP port 21, use nc -I 127.0.0.1 -p 21.

    • Question 8: To capture all telnet traffic to and from 10.11.12.3 and save the traffic to a file named traffic.pcap, use tcpdump -i eth0 -w traffic.pcap host 10.11.12.3 and port 23

    • Question 9: A bash script while :; do touch $RANDOM.txt; done repeatedly creates a new text file with a random name.

    • Question 10: Confidentiality ensures illegitimate users cannot read information, integrity ensures they can't modify, and authentication ensures they can't impersonate legitimate users.

    Command-Based Tasks

    • Task 1: To generate an MD5 hash for the ISO image newlinux.iso, use the certutil -hashfile newlinux.iso MD5 command (case is not important).

    • Task 2: To perform an nmap port scan in verbose mode on the IPv4 subnet 10.11.12.0/24 use the command nmap -vv 10.11.12.0/24.

    • Task 3: To scan the host 208.67.201.5 to determine if anonymous login is allowed, use a Metasploit command (exact command is needed).

    • Task 4: To generate a reverse TCP payload file (e.g., for windows) use Metasploit.

    • Task 5: To determine the SMTP server version running on host 192.168.2.1 use a Metasploit auxiliary module smtp_version (exact command needs to be written).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on information security, risk management, and network protocols with this quiz. It covers topics such as detection controls, IP security, and ISO27001 procedures. Perfect for students in cybersecurity programs or professionals looking to refresh their skills.

    More Like This

    Information Security Risk Management
    5 questions
    Corso di Sicurezza Informatica
    8 questions
    Use Quizgecko on...
    Browser
    Browser