Network Security and Router Configuration Quiz

PlushRuthenium avatar
PlushRuthenium
·
·
Download

Start Quiz

Study Flashcards

30 Questions

Which utility can be used to edit the Windows registry?

Regedit.exe

Which step is NOT a valid measure for securing routers?

Use a password that is easy to remember for a router's administrative console.

Which attack involves the insertion of an intermediary software between two communicating hosts?

Man-in-the-middle

Which protocol provides the highest level of VPN security?

IPSec

What protocol do hosts use to retrieve IP address assignments and configuration information?

DHCP

In which attack did Adam, the malicious hacker, manage to steal a secure cookie through an XSS vulnerability?

Cross-Site Request Forgery (CSRF)

Which of the following management processes focuses on promoting quick recovery and an effective response to protect brand, reputation, and stakeholders?

Business Continuity Management

In the CSMA/CA method, what does a device or computer need to do before transmitting data?

Listen to the channel for activity

Which organization is responsible for managing the assignment of domain names and IP addresses?

ICANN

What type of recovery plan includes strategies to address specific variations in assumptions that lead to security issues or emergencies?

Contingency plan

Which process aims to identify threats like DDoS attacks and policy violations by examining network traffic?

Security Information and Event Management (SIEM)

What concept involves providing actions to deal with specific variances in assumptions leading to security problems or emergencies?

Contingency plan

What type of encryption is performed at the network layer?

Layer 1 encryption

Which tool is capable of intercepting traffic on a network segment and capturing usernames and passwords in Unix and Windows environments?

Ettercap

Which proposed enhancement to wireless LAN specifications offers quality of service (QoS) features and prioritization of data, voice, and video transmissions?

802.11e

What key feature is used by TCP to regulate the amount of data sent between hosts on a network?

Flow control

Which team members are typically included in the incident response team as part of the incident response process?

Technical and non-technical staff within the organization

What does a security policy document describe within an organization?

Security requirements scope

Which authentication method is NOT a WEP authentication method?

Kerberos authentication

What technology helps in blocking all unauthorized inbound and/or outbound traffic?

Firewall

Which type of firewall is also known as a stateful firewall?

PIX firewall

What is a centralized collection of honeypots and analysis tools called?

Honeynet

Which routing metric is defined as the sum of the costs associated with each link traversed?

Path length

Which honeypot is described as a useful burglar alarm?

Backofficer friendly

Which protocol provides a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and offers tunneling, address assignment, and authentication?

L2TP

What is the purpose of syslog-ng in Unix systems?

syslog

Which incident response practice set is recommended by the CERT/CC?

Prepare, handle, and follow up

What is the function of a Honeyfarm in cybersecurity systems?

Honeyfarm

In a system examination for known vulnerabilities, which tool would typically alert the administrator?

SAINT

Which layer of the OSI model is closest to the end user in network communications?

Application layer

Test your knowledge on network security utilities and steps for securing routers in this quiz. Choose the correct options for each question to determine your understanding of these concepts.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser