Network Defense and Countermeasures Exam Bank - 588 Verified Questions

Page 1


Network Defense and Countermeasures Exam Bank

Course Introduction

Network Defense and Countermeasures explores the strategies, tools, and practices necessary to protect computer networks from malicious activities and cyberattacks. This course covers foundational concepts of network security, including threat analysis, risk assessment, and defense planning, as well as the implementation of firewalls, intrusion detection and prevention systems, and secure network architectures. Students will learn about emerging threats, cybersecurity policies, and incident response procedures, gaining hands-on experience in developing and applying robust countermeasures to safeguard organizational information assets.

Recommended Textbook

Security+ Guide to Network Security Fundamentals 4th Edition by Mark Ciampa

Available Study Resources on Quizplus

14 Chapters

588 Verified Questions

588 Flashcards

Source URL: https://quizplus.com/study-set/1054

Page 2

Chapter 1: Introduction to Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20875

Sample Questions

Q1) Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.

A)True

B)False

Answer: True

Q2) An information security ____ position focuses on the administration and management of plans, policies, and people.

A) manager

B) engineer

C) auditor

D) inspector

Answer: A

Q3) In information security, a loss can be ____.

A) theft of information

B) a delay in transmitting information that results in a financial penalty

C) the loss of good will or a reputation

D) all of the above

Answer: D

Q4) ____________________ provides tracking of events.

Answer: Accounting

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Malware and Social Engineering Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20876

Sample Questions

Q1) A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program.

A) macro

B) metamorphic

C) boot

D) companion

Answer: D

Q2) A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.

Answer: keylogger

Q3) What is a worm?

Answer: A worm is a malicious program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer. Once the worm has exploited the vulnerability on one system, it immediately searches for another computer that has the same vulnerability. A worm uses a network to send copies of itself to other devices also connected to the network.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Application and Network Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20877

Sample Questions

Q1) ____ is for the transport and storage of data, with the focus on what the data is.

A) XML

B) HTML

C) SGML

D) SML

Answer: A

Q2) List three of the most common Web application attacks.

Answer: The most common Web application attacks are cross-site scripting, SQL injection, XML injection, and command injection/directory traversal.

Q3) The default root directory of the Microsoft Internet Information Services (IIS) Web server is ____.

A) /var/www

B) C:\Inetpub\ wwwroot

C) /var/html

D) /etc/var/www

Answer: B

Q4) All Web traffic is based on the ____________________ protocol.

Answer: HTTP

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Vulnerability Assessment and Mitigating Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20878

Sample Questions

Q1) Describe a penetration testing report.

Q2) The first step in a vulnerability assessment is to determine the assets that need to be protected.

A)True

B)False

Q3) A(n) ____________________ scan uses various techniques to avoid detection.

Q4) ____ is a comparison of the present state of a system compared to its baseline.

A) Baseline reporting

B) Compliance reporting

C) Baseline assessment

D) Compliance review

Q5) A(n) ____ is hardware or software that captures packets to decode and analyze its contents.

A) application analyzer

B) protocol analyzer

C) threat profiler

D) system analyzer

Q6) A(n) ____________________ box test is one in which some limited information has been provided to the tester.

Q7) List two types of hardening techniques.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Host, Application, and Data Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20879

Sample Questions

Q1) A ____ is designed to separate a nonsecured area from a secured area.

A) lockout

B) mantrap

C) closet

D) pit

Q2) A ____ is software that is a cumulative package of all security updates plus additional features.

A) feature pack

B) roll-up

C) service pack

D) patch

Q3) ____ is defined as a security analysis of the transaction within its approved context.

A) Content aggregation

B) Content inspection

C) Content delivery

D) Content management

Q4) Describe RFID tags.

Q5) ____________________ locks keep a record of when the door was opened and by which code.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Network Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20880

Sample Questions

Q1) ____ is typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).

A) PAT

B) NAT

C) PAN

D) PNAT

Q2) Describe all-in-one network security appliances.

Q3) Each operation in a computing environment starts with a ____.

A) system call

B) unit call

C) hardware instruction

D) system exception

Q4) List and describe three features of Internet content filters.

Q5) A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.

A) proxy server

B) DNS server

C) VPN server

D) telnet server

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Administering a Secure Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20881

Sample Questions

Q1) ____ provides a greater degree of security by implementing port-based authentication.

A) IEEE 802.3ad

B) IEEE 802.11n

C) IEEE 802.1x

D) IEEE 802.1z

Q2) List the steps in an 802.1x authentication procedure.

Q3) IEEE 802.1x is commonly used on wireless networks.

A)True

B)False

Q4) TCP port ____ is the FTP control port used for passing FTP commands.

A) 19

B) 20

C) 21

D) 22

Q5) IP telephony and Voice over IP (VoIP) are identical.

A)True

B)False

Q6) What are the two types of community strings?

Q7) List and describe three benefits offered by IP telephony.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Wireless Network Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20882

Sample Questions

Q1) Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.

A) 10

B) 18

C) 15

D) 33

Q2) When a wireless device looks for beacon frames it is known as ____________________.

Q3) Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.

A)True

B)False

Q4) Describe a piconet.

Q5) The SSID can generally be any alphanumeric string from 2 to ___ characters.

A) 23

B) 28

C) 32

D) 34

Q6) On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Access Control Fundamentals

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20883

Sample Questions

Q1) Authorization and access are viewed as synonymous and in access control, they are the same step.

A)True

B)False

Q2) A user accessing a computer system must present credentials or ____ when logging on to the system.

A) access

B) authorize

C) token

D) identification

Q3) ____ is considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.

A) Role Based Access Control

B) Rule Based Access Control

C) Discretionary Access Control

D) Mandatory Access Control

Q4) Often ____________________ results from a single user being trusted with a set of responsibilities that place the person in complete control of the process.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Authentication and Account Management

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20884

Sample Questions

Q1) Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.

A) federated identity management

B) liberated identity management

C) central identity management

D) distributed identity management

Q2) A ____ is a secret combination of letters, numbers, and/or characters that only the user should know.

A) token

B) password

C) biometric detail

D) challenge

Q3) Due to the limitations of online guessing, most password attacks today use ____.

A) offline cracking

B) online cracking

C) hash replay

D) token replay

Q4) Explain how an attacker can use a resetting attack.

Q5) Discuss the weaknesses of OpenID.

Q6) What are the three advantages of a rainbow table over other password attacks?

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Basic Cryptography

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20885

Sample Questions

Q1) Describe how a block cipher works.

Q2) The basis for a digital signature rests on the ability of ____ keys to work in both directions.

A) symmetric

B) shared

C) unique

D) asymmetric

Q3) ____ encryption uses two keys instead of only one and these keys are mathematically related.

A) Symmetric

B) Asymmetric

C) Shared

D) Public key

Q4) The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.

A) AES

B) RSA

C) Twofish

D) Blowfish

Q5) Cleartext data that is to be encrypted is called ____________________.

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Advanced Cryptography

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20886

Sample Questions

Q1) List three pieces of information a digital certificate typically contains.

Q2) Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.

A)True

B)False

Q3) ____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.

A) Blocking

B) Hashing

C) Encrypting

D) Cloning

Q4) At the ____ stage of the certificate life cycle, the certificate is no longer valid.

A) creation

B) suspension

C) revocation

D) expiration

Q5) Explain how digital certificates are managed.

Q6) List three general duties of a CA.

Q7) List the four stages of a certificate life cycle.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Business Continuity

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20887

Sample Questions

Q1) Describe the Windows page file and discuss why it can be important for evidence recovery.

Q2) System availability is often expressed as a percentage of uptime in a year.

A)True

B)False

Q3) The ____ response team serves as first responders whenever digital evidence needs to be preserved.

A) incident

B) computer forensics

C) risk

D) emergency

Q4) ____________________ is data about data.

Q5) Most metadata about a file is generated and recorded automatically without the user's knowledge.

A)True

B)False

Q6) Describe what happens when the response team arrives and secures the crime scene.

Q7) RAID 0 technology is based on ____________________.

Page 15

Q8) Discuss the purpose and importance of the chain of custody.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Risk Mitigation

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20888

Sample Questions

Q1) A(n) ____ approach is the art of helping an adult learn.

A) andragogical

B) pedagogical

C) deontological

D) metagogical

Q2) ____ can be defined as the study of what a group of people understand to be good and right behavior and how people make those judgments.

A) Values

B) Morals

C) Ethics

D) Standards

Q3) When designing a security policy, many organizations follow a standard set of

Q4) ____ can be defined as the "framework" and functions required to enable incident response and incident handling within an organization.

A) Incident reporting

B) Incident management

C) Incident handling

D) Incident planning

To view all questions and flashcards with answers, click on the resource link above. Page 16

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Network Defense and Countermeasures Exam Bank - 588 Verified Questions by Quizplus - Issuu