What is a dictionary attack (brute force attack)?
Answer: Repeatedly generating passwords to attempt to guess a password
Answer: Repeatedly generating passwords to attempt to guess a password
Answer: no ip domain-lookup
Answer: ip name-server addresses
Answer: (1) Offers no authentication or integrity assurance (2) By default, name queries are sent to the broadcast address 255.255.255.255
Answer: NTP leaves listening ports open and vulnerable
Answer: Version 1 and Version 2 pass management information and community strings (passwords) in clear text
Answer: Disruption of peers is less critical because routing protocols eventually readjust themselves
Answer: (1) Redirect traffic to create routing loops (2) Redirect traffic so it can be monitored on an insecure link (3) Redirect traffic to discard it
Answer: The data piece of a frame (IPv4 Packet)
Answer: (1) Disruption of peers (2) Falsification of routing information
Answer: It sends data in plaintext
(1) Prevent RIP routing update propagation (2) Prevent Unauthorized Reception of RIP updates (3) Verify the operation of RIP routing
Answer: (1) Info Gathering (2) Info theft
Answer: AutoSecure
Answer: Non-Interactive Mode
Answer: Interactive Mode
Answer: (1) Interactive mode (2) Non-interface mode
Answer: auto secure
Answer: (1) Interface (2) Banners (3) Passwords (4) SSH (5) IOS Firewall FEatures
Answer: internal network components to scans and attacks, making it easier for attackers to avoid detection.
Answer: reduce performance, deny network communication services and expose sensitive data.
Answer: network configuration details, thereby facilitating attacks against other network components.
Answer: (1) Dial-in Access Policy (2) Remote Access Policy (3) VPN Security Policy
Answer: (1) Automatically Forward E-mail Policy (2) E-mail Policy (3) Spam Policy
(1) Statement of Authority and Scope (2) Acceptable Use Policy (AUP) (3) Identification and Authentication Policy (4) Internet Access Policy (5) Campus Access Policy (6) Remote Access Policy
(7) Incident Handling Procedure (8) Account Access Request Policy (9) Acquisition Assessment Policy (10) Audit Policy (11) Information Sensitivity Policy (12) Password Policy (13) Risk Assessment Policy (14) Global Web Server Policy
Answer: (1) Protects people and information (2) Sets the rules for expected behavior by users, system administrators, management and security personnel (3)Authorizes security personnel to monitor, probe and investigate (4) Defines and authorizes the consequences of violations
Answer: (1) Provides a means to audit existing network security and compare the requirements to what is in place. (2) Plan security improvements, including equipment, software, and procedures. (3) Defines the roles and responsibilities of the company executives, administrators, and users (4) Defines which behavior is and is not allowed (5) Defines a process for handling network security incidents (6) Creates a basis for legal action if necessary (7) Enables global security implementation and enforcement by acting as a standard between sites.
Answer: Improve
Answer: Test
Answer: IDS devices to detect intrusion
Answer: Audit host-level log files
Answer: (1) Active Method (2) Passive Methods
Answer: (1) Threat Defense (2) Stateful inspection and packet filtering
Answer: (1) Identifies the security objectives of the organization (2) Documents the resources to be protected (3) Identifies the network infrastructure with current maps and inventories (4) Identifies the critical resources that need to be protected (risk analysis)
Answer: Retesting and reapplying updated security measures on a continuous basis
Answer: (1) Secure (2) Monitor (3) Test (4) Improve
Answer: (1) Firewall (2) Intrusion Prevention (3) VPN
Answer: (1) Threat Control (1a) Regulates network access, isolates infected systems, prevents intrusions and protects assets by counteracting malicious traffic such as viruses and worms. (2) Secure Communications (2a) Secures network endpoints with VPN (3) Network Admission Control (NAC) (3a) Provides a roles-based method of preventing unauthorized access to a network
Answer: On publicly accessible servers and corporate mail and application servers. Agent reports events to a central console server located inside the corporate firewall. As an alternative, agents on the host can send logs as e-mail to an administrator
Answer: Security Agent Software
Answer: Host-Based Intrusion Prevention System (HIPS)
Answer: Host-Based Intrusion Prevention Systems (HIDS)
Answer: Yes
Answer: (1) Prevention (1a) Stops the detected attack from executing (2) Reaction (2a) Immunizes the system from future attacks
Answer: Intrusion Detection System
Answer: Create a central Patch Server that all systems must communicate with after a set period of time
Answer: Download security updates and patch all vulnerable systems
Answer: (1) Antivirus Software (2) Personal Firewalls
Answer: (1) Default usernames and passwords should be changed (2) Access to system resources should be restricted to only the individuals that are authorized (3) Any unnecessary services should be turned off or uninstalled.
Answer: Trojan Horse
Answer: Human interaction is required to facilitate the spread of a virus.
Answer: Virus
Answer: Virus
Answer: Payload
Answer: Propagation Mechanism
Answer: The Enabling Vulnerability
Answer: (1) The enabling vulnerability (2) Propagation Mechanism (3) Payload
Answer: Worm, Virus, and Trojan Horse Attacks
Answer: (1) SMURF Attack (2) Tribe Flood Network (TFN) (3) Stacheldraht (4) MyDoom
Answer: Distributed Denial of Service Attacks
Answer: e-mail bombs
Answer: Malicious applets
Answer: (1) Ping of Death (2) SYN Flood (3) E-mail Bombs (4) Malicious Applets
Answer: Port Security on LAN switches
Answer: (1) ettercap (2) ARP poisoning
Answer: VPN tunnels
Answer: Man-in-the-middle
Answer: Intrusion Detection System (IDS)
Answer: netcat
Answer: Port Redirection
Answer: Trust Exploitation
Answer: (1) Passwords (2) Trust Exploitation
Answer: Access Attacks
Answer: (1) Using switched networks instead of hubs (2) Using encryption that meets the data security needs (3) Forbidding the use of protocols with known susceptibilities to eavesdropping?
Answer: Packet Sniffers
Answer: (1) Internet Information Queries (2) Ping Sweeps (3) Port Scans (4) Packet Sniffers
Answer: Denial of Service
Answer: (1) Nmap (2) Superscan
Answer: Port Scans
Answer: (1) fping (2) gping
Answer: Ping Sweeps
(1) Recon Attacks (2) Access Attacks (3) Denial of Service Attacks (4) Works, Viruses, and Trojan Horses
Answer: Internet Information Queries
Answer: Worms, Viruses, and Trojan Horses
Answer: Denial of Service
Answer: System Access
Answer: Reconnaissance
Answer: Phishing
Answer: Internal Threats
Answer: External threats
Answer: structured threats
Answer: Unstructured Threats
(1) Unstructured Threats (2) Structured Threats (3) External Threats (4) Internal Threats
(1) Use neat cable runs (2) Label critical cables and components (3) Use electrostatic discharge procedures (4) Stock critical spares (5) Control access to console ports
(1) Install UPS systems (2) Install generate sets (3) Fallow a preventative maintenance plan (4) Install redundant power supplies (5) Perform remote alarming and monitoring
(1) Temperature control (2) Humidity control (3) Positive air flow (4) Remote environmental alarming and recording and monitoring
(1) Lock up Equipment to prevent unauthorized access from the doors, ceiling, raised floor, etc (2) Monitor and control closet entry with electronic logs (3) Use security cameras
Answer: Environmental Threats
Answer: Hardware Threats
(1) Hardware (2) Environment (3) Electrical (4) Maintenance
(1) Lack of written security policy (2) Politics (3) Lack of Continuity (4) Logical access controls not applied (5) Software and hardware installation and changed do not follow policy (6) Disaster recovery plan is nonexistent