Network Security and Router Configuration Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which utility can be used to edit the Windows registry?

  • Regedit.exe (correct)
  • Resplendent registrar
  • EventCombMT
  • Reg.exe

Which step is NOT a valid measure for securing routers?

  • Keep routers updated with the latest security patches.
  • Use a password that is easy to remember for a router's administrative console. (correct)
  • Configure access list entries to prevent unauthorized connections and traffic routing.
  • Use a complex password for a router's administrative console.

Which attack involves the insertion of an intermediary software between two communicating hosts?

  • Session hijacking
  • Denial-of-Service
  • Buffer overflow
  • Man-in-the-middle (correct)

Which protocol provides the highest level of VPN security?

<p>IPSec (A)</p> Signup and view all the answers

What protocol do hosts use to retrieve IP address assignments and configuration information?

<p>DHCP (C)</p> Signup and view all the answers

In which attack did Adam, the malicious hacker, manage to steal a secure cookie through an XSS vulnerability?

<p>Cross-Site Request Forgery (CSRF) (D)</p> Signup and view all the answers

Which of the following management processes focuses on promoting quick recovery and an effective response to protect brand, reputation, and stakeholders?

<p>Business Continuity Management (C)</p> Signup and view all the answers

In the CSMA/CA method, what does a device or computer need to do before transmitting data?

<p>Listen to the channel for activity (D)</p> Signup and view all the answers

Which organization is responsible for managing the assignment of domain names and IP addresses?

<p>ICANN (B)</p> Signup and view all the answers

What type of recovery plan includes strategies to address specific variations in assumptions that lead to security issues or emergencies?

<p>Contingency plan (A)</p> Signup and view all the answers

Which process aims to identify threats like DDoS attacks and policy violations by examining network traffic?

<p>Security Information and Event Management (SIEM) (A)</p> Signup and view all the answers

What concept involves providing actions to deal with specific variances in assumptions leading to security problems or emergencies?

<p>Contingency plan (D)</p> Signup and view all the answers

What type of encryption is performed at the network layer?

<p>Layer 1 encryption (B)</p> Signup and view all the answers

Which tool is capable of intercepting traffic on a network segment and capturing usernames and passwords in Unix and Windows environments?

<p>Ettercap (A)</p> Signup and view all the answers

Which proposed enhancement to wireless LAN specifications offers quality of service (QoS) features and prioritization of data, voice, and video transmissions?

<p>802.11e (B)</p> Signup and view all the answers

What key feature is used by TCP to regulate the amount of data sent between hosts on a network?

<p>Flow control (A)</p> Signup and view all the answers

Which team members are typically included in the incident response team as part of the incident response process?

<p>Technical and non-technical staff within the organization (B)</p> Signup and view all the answers

What does a security policy document describe within an organization?

<p>Security requirements scope (D)</p> Signup and view all the answers

Which authentication method is NOT a WEP authentication method?

<p>Kerberos authentication (A)</p> Signup and view all the answers

What technology helps in blocking all unauthorized inbound and/or outbound traffic?

<p>Firewall (D)</p> Signup and view all the answers

Which type of firewall is also known as a stateful firewall?

<p>PIX firewall (B)</p> Signup and view all the answers

What is a centralized collection of honeypots and analysis tools called?

<p>Honeynet (D)</p> Signup and view all the answers

Which routing metric is defined as the sum of the costs associated with each link traversed?

<p>Path length (B)</p> Signup and view all the answers

Which honeypot is described as a useful burglar alarm?

<p>Backofficer friendly (C)</p> Signup and view all the answers

Which protocol provides a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and offers tunneling, address assignment, and authentication?

<p>L2TP (A)</p> Signup and view all the answers

What is the purpose of syslog-ng in Unix systems?

<p>syslog (B)</p> Signup and view all the answers

Which incident response practice set is recommended by the CERT/CC?

<p>Prepare, handle, and follow up (B)</p> Signup and view all the answers

What is the function of a Honeyfarm in cybersecurity systems?

<p>Honeyfarm (D)</p> Signup and view all the answers

In a system examination for known vulnerabilities, which tool would typically alert the administrator?

<p>SAINT (B)</p> Signup and view all the answers

Which layer of the OSI model is closest to the end user in network communications?

<p>Application layer (D)</p> Signup and view all the answers

More Like This

Router Configuration Basics Quiz
12 questions
Changing Wi-Fi Network Settings
10 questions
modull10-Basic Router Configuration
8 questions
Use Quizgecko on...
Browser
Browser