Network Security and Router Configuration Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which utility can be used to edit the Windows registry?

  • Regedit.exe (correct)
  • Resplendent registrar
  • EventCombMT
  • Reg.exe
  • Which step is NOT a valid measure for securing routers?

  • Keep routers updated with the latest security patches.
  • Use a password that is easy to remember for a router's administrative console. (correct)
  • Configure access list entries to prevent unauthorized connections and traffic routing.
  • Use a complex password for a router's administrative console.
  • Which attack involves the insertion of an intermediary software between two communicating hosts?

  • Session hijacking
  • Denial-of-Service
  • Buffer overflow
  • Man-in-the-middle (correct)
  • Which protocol provides the highest level of VPN security?

    <p>IPSec</p> Signup and view all the answers

    What protocol do hosts use to retrieve IP address assignments and configuration information?

    <p>DHCP</p> Signup and view all the answers

    In which attack did Adam, the malicious hacker, manage to steal a secure cookie through an XSS vulnerability?

    <p>Cross-Site Request Forgery (CSRF)</p> Signup and view all the answers

    Which of the following management processes focuses on promoting quick recovery and an effective response to protect brand, reputation, and stakeholders?

    <p>Business Continuity Management</p> Signup and view all the answers

    In the CSMA/CA method, what does a device or computer need to do before transmitting data?

    <p>Listen to the channel for activity</p> Signup and view all the answers

    Which organization is responsible for managing the assignment of domain names and IP addresses?

    <p>ICANN</p> Signup and view all the answers

    What type of recovery plan includes strategies to address specific variations in assumptions that lead to security issues or emergencies?

    <p>Contingency plan</p> Signup and view all the answers

    Which process aims to identify threats like DDoS attacks and policy violations by examining network traffic?

    <p>Security Information and Event Management (SIEM)</p> Signup and view all the answers

    What concept involves providing actions to deal with specific variances in assumptions leading to security problems or emergencies?

    <p>Contingency plan</p> Signup and view all the answers

    What type of encryption is performed at the network layer?

    <p>Layer 1 encryption</p> Signup and view all the answers

    Which tool is capable of intercepting traffic on a network segment and capturing usernames and passwords in Unix and Windows environments?

    <p>Ettercap</p> Signup and view all the answers

    Which proposed enhancement to wireless LAN specifications offers quality of service (QoS) features and prioritization of data, voice, and video transmissions?

    <p>802.11e</p> Signup and view all the answers

    What key feature is used by TCP to regulate the amount of data sent between hosts on a network?

    <p>Flow control</p> Signup and view all the answers

    Which team members are typically included in the incident response team as part of the incident response process?

    <p>Technical and non-technical staff within the organization</p> Signup and view all the answers

    What does a security policy document describe within an organization?

    <p>Security requirements scope</p> Signup and view all the answers

    Which authentication method is NOT a WEP authentication method?

    <p>Kerberos authentication</p> Signup and view all the answers

    What technology helps in blocking all unauthorized inbound and/or outbound traffic?

    <p>Firewall</p> Signup and view all the answers

    Which type of firewall is also known as a stateful firewall?

    <p>PIX firewall</p> Signup and view all the answers

    What is a centralized collection of honeypots and analysis tools called?

    <p>Honeynet</p> Signup and view all the answers

    Which routing metric is defined as the sum of the costs associated with each link traversed?

    <p>Path length</p> Signup and view all the answers

    Which honeypot is described as a useful burglar alarm?

    <p>Backofficer friendly</p> Signup and view all the answers

    Which protocol provides a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and offers tunneling, address assignment, and authentication?

    <p>L2TP</p> Signup and view all the answers

    What is the purpose of syslog-ng in Unix systems?

    <p>syslog</p> Signup and view all the answers

    Which incident response practice set is recommended by the CERT/CC?

    <p>Prepare, handle, and follow up</p> Signup and view all the answers

    What is the function of a Honeyfarm in cybersecurity systems?

    <p>Honeyfarm</p> Signup and view all the answers

    In a system examination for known vulnerabilities, which tool would typically alert the administrator?

    <p>SAINT</p> Signup and view all the answers

    Which layer of the OSI model is closest to the end user in network communications?

    <p>Application layer</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser