Network Management Quiz 3
22 Questions
104 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which protocol is used for network management and can gather statistics and derive a current status from the node that it is operating on?

  • NTP
  • SNMP (correct)
  • SNMP (correct)
  • SSH
  • Which of the following is part of a DMZ but bridges access from organization to organization?

  • Outernet
  • Internet
  • Extranet (correct)
  • Intranet
  • How many subnets can be provided using a /26 classless inter-domain routing (CIDR)?

  • 3
  • 1
  • 4 (correct)
  • 2
  • What encryption algorithm is used within TLS?

    <p>RSA</p> Signup and view all the answers

    Prior to deploying an anomaly-based detection system on a network, what must be achieved?

    <p>Baseline</p> Signup and view all the answers

    Which of the following records determines a mail server in your domain?

    <p>MX</p> Signup and view all the answers

    Which of the following has the least amount of memory available?

    <p>CPU cache</p> Signup and view all the answers

    You are a security administrator for an online dating website. Your website recently experienced a zero-day SSL attack that leaked information about your SQL database. As an immediate course of action, what would be your first choice in defending and keeping your client's information safe?

    <p>Update all the web servers with the latest virus definitions.</p> Signup and view all the answers

    The SAM log file entry is located in what part of a Windows Registry system?

    <p>HKEY_LOCAL_MACHINE\SAM</p> Signup and view all the answers

    Under which auxiliary in Metasploit can you scan for SNMP configurations?

    <p>auxiliary/scanner/snmp</p> Signup and view all the answers

    In Linux, what command is used to search for information?

    <p>grep</p> Signup and view all the answers

    Which of the following tools is used to encode your payload in Metasploit?

    <p>msfencode</p> Signup and view all the answers

    A system is compromised and is able to spawn a connection back to the adversary. What is the common term used to describe this activity?

    <p>Reverse shellcode</p> Signup and view all the answers

    What type of function is being called by strcpy(attacker, "exploit_this");?

    <p>strcpy</p> Signup and view all the answers

    Which of the following protocols is/are vulnerable to session hijacking?

    <p>UDP/IP</p> Signup and view all the answers

    Which standard provides best business practice for information security management?

    <p>ISO 27002</p> Signup and view all the answers

    What is the function of a CNAME record?

    <p>Supplements an alias to a domain name</p> Signup and view all the answers

    Which of the following provides steganography?

    <p>XPtools</p> Signup and view all the answers

    In Linux, besides the User and Group, what other object can be assigned permissions?

    <p>Others</p> Signup and view all the answers

    In the TCP/IP model, what is the equivalent of the OSI Network layer?

    <p>Internet</p> Signup and view all the answers

    Which of the following scanners provides ping sweeps and at times can be very noisy if not properly configured?

    <p>Angry IP</p> Signup and view all the answers

    What UDP flag forces a connection to terminate at both ends of the circuit?

    <p>None</p> Signup and view all the answers

    Study Notes

    Network Protocols

    • SNMP (Simple Network Management Protocol) is utilized for network management, gathering statistics, and obtaining the current status of a node.
    • Extranet serves as a connection point that bridges access between organizations within a DMZ (Demilitarized Zone).

    Subnets and CIDR

    • A /26 CIDR (Classless Inter-Domain Routing) can create up to 4 subnets.

    Encryption and Security Measures

    • RSA (Rivest-Shamir-Adleman) is the encryption algorithm deployed within TLS (Transport Layer Security).
    • Establishing a baseline is crucial before deploying an anomaly-based detection system on a network.
    • For immediate action during a zero-day SSL attack, updating web servers with the latest virus definitions is an essential first step.

    DNS Records

    • MX (Mail Exchange) records determine the mail server used in a domain.
    • CNAME (Canonical Name) records provide an alias for a domain name.

    Memory and Systems

    • CPU cache is the memory type with the least availability, being the most volatile.
    • In a compromised system, the term "reverse shellcode" describes a scenario where a connection is initiated back to an adversary.

    Tools and Commands

    • The grep command in Linux is used for searching information.
    • In Metasploit, msfencode is the tool utilized for encoding payloads.

    Permissions in Linux

    • Besides User and Group, the "Others" object can be assigned permissions in Linux systems.

    TCP/IP and OSI Model

    • The Internet layer in the TCP/IP model corresponds to the Network layer in the OSI (Open Systems Interconnection) model.

    Security Standards

    • ISO 27002 outlines best business practices for information security management.

    Scanning and Network Tools

    • Angry IP scanner offers ping sweeps and can be considered noisy if not correctly configured.

    Session Hijacking and Vulnerabilities

    • UDP/IP protocols are known to be vulnerable to session hijacking attacks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of network management protocols with this quiz featuring challenging flashcards. Each question is designed to evaluate your understanding of key concepts such as SNMP and DMZs. Perfect for anyone studying networking principles or preparing for exams.

    More Like This

    Network Management System: SNMP
    10 questions
    SNMP Fundamentals
    28 questions

    SNMP Fundamentals

    PanoramicRutherfordium7644 avatar
    PanoramicRutherfordium7644
    SNMP Overview and Operations
    42 questions
    Use Quizgecko on...
    Browser
    Browser