30 Questions
Which utility can be used to edit the Windows registry?
Regedit.exe
Which step is NOT a valid measure for securing routers?
Use a password that is easy to remember for a router's administrative console.
Which attack involves the insertion of an intermediary software between two communicating hosts?
Man-in-the-middle
Which protocol provides the highest level of VPN security?
IPSec
What protocol do hosts use to retrieve IP address assignments and configuration information?
DHCP
In which attack did Adam, the malicious hacker, manage to steal a secure cookie through an XSS vulnerability?
Cross-Site Request Forgery (CSRF)
Which of the following management processes focuses on promoting quick recovery and an effective response to protect brand, reputation, and stakeholders?
Business Continuity Management
In the CSMA/CA method, what does a device or computer need to do before transmitting data?
Listen to the channel for activity
Which organization is responsible for managing the assignment of domain names and IP addresses?
ICANN
What type of recovery plan includes strategies to address specific variations in assumptions that lead to security issues or emergencies?
Contingency plan
Which process aims to identify threats like DDoS attacks and policy violations by examining network traffic?
Security Information and Event Management (SIEM)
What concept involves providing actions to deal with specific variances in assumptions leading to security problems or emergencies?
Contingency plan
What type of encryption is performed at the network layer?
Layer 1 encryption
Which tool is capable of intercepting traffic on a network segment and capturing usernames and passwords in Unix and Windows environments?
Ettercap
Which proposed enhancement to wireless LAN specifications offers quality of service (QoS) features and prioritization of data, voice, and video transmissions?
802.11e
What key feature is used by TCP to regulate the amount of data sent between hosts on a network?
Flow control
Which team members are typically included in the incident response team as part of the incident response process?
Technical and non-technical staff within the organization
What does a security policy document describe within an organization?
Security requirements scope
Which authentication method is NOT a WEP authentication method?
Kerberos authentication
What technology helps in blocking all unauthorized inbound and/or outbound traffic?
Firewall
Which type of firewall is also known as a stateful firewall?
PIX firewall
What is a centralized collection of honeypots and analysis tools called?
Honeynet
Which routing metric is defined as the sum of the costs associated with each link traversed?
Path length
Which honeypot is described as a useful burglar alarm?
Backofficer friendly
Which protocol provides a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and offers tunneling, address assignment, and authentication?
L2TP
What is the purpose of syslog-ng in Unix systems?
syslog
Which incident response practice set is recommended by the CERT/CC?
Prepare, handle, and follow up
What is the function of a Honeyfarm in cybersecurity systems?
Honeyfarm
In a system examination for known vulnerabilities, which tool would typically alert the administrator?
SAINT
Which layer of the OSI model is closest to the end user in network communications?
Application layer
Test your knowledge on network security utilities and steps for securing routers in this quiz. Choose the correct options for each question to determine your understanding of these concepts.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free