Network Defense Exam Answer Key - 673 Verified Questions

Page 1


Network Defense

Exam Answer Key

Course Introduction

Network Defense focuses on the strategies, tools, and best practices used to protect computer networks from unauthorized access, attacks, and data breaches. Students will explore topics such as firewalls, intrusion detection and prevention systems, access control mechanisms, network segmentation, security protocols, and vulnerability management. The course emphasizes hands-on experience through practical labs and simulations, enabling students to design, implement, and monitor defensive measures that help safeguard corporate and organizational networks. Security policies, incident response, and ethical and legal considerations in network defense are also discussed to provide a comprehensive understanding of the field.

Recommended Textbook

Hands On Ethical Hacking and Network Defense 2nd Edition by Michael T. Simpson

Available Study Resources on Quizplus

13 Chapters

673 Verified Questions

673 Flashcards

Source URL: https://quizplus.com/study-set/2085 Page 2

Chapter 1: Ethical Hacking Overview

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41510

Sample Questions

Q1) In the ____ model, management does not divulge to staff that penetration testing is being conducted, nor does it give the tester any diagrams or describe what technologies the company is using.

A)gray box

B)white box

C)black box

D)red box

Answer: C

Q2) A ____ can be created that welcomes new users joining a chat session, even though a person isn't actually present to welcome them.

A)byte

B)packet

C)switch

D)bot

Answer: D

Q3) Employees of a security company are protected under the company's ____________________ with the client.

Answer: contract

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Tcpip Concepts Review

Available Study Resources on Quizplus for this Chatper

57 Verified Questions

57 Flashcards

Source URL: https://quizplus.com/quiz/41511

Sample Questions

Q1) An octet is equal to ____________________ bits, which equals one byte. Answer: eight

Q2) No matter what medium connects computers on a network-copper wires, fiber-optic cables, or a wireless setup-the same protocol must be running on all computers if communication is going to function correctly.

A)True

B)False

Answer: True

Q3) In TCP, the ______________________________ is a 32-bit number that tracks the packets received by the node and allows reassembling of large packets that have been broken up into smaller packets. Answer: initial sequence number (ISN)

ISN initial sequence number

Q4) To retrieve e-mail from a mail server, you most likely access port 119. A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network and Computer Attacks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41512

Sample Questions

Q1) What is the most important recommendation that should be made to a client to help prevent viruses from being introduced into corporate networks?

Answer: To help prevent viruses from being introduced into corporate networks,the most important recommendation you should make to a client is to update virus signature files as soon as they're available from the vendor.Most antivirus software does this automatically or prompts the user to do so.An organization can't depend on employee vigilance to protect its systems,so centralizing all antivirus software updates from a corporate server is prudent.

Q2) ____ is concerned with the security of computers or devices that are part of a network infrastructure.

A)Attack security

B)Cybercrime

C)Computer security

D)Network security

Answer: D

Q3) ____________________ is defined as securing a stand-alone computer that's not part of a network infrastructure.

Answer: Computer security

To view all questions and flashcards with answers, click on the resource link above.

5

Chapter 4: Footprinting and Social Engineering

Available Study Resources on Quizplus for this Chatper

51 Verified Questions

51 Flashcards

Source URL: https://quizplus.com/quiz/41513

Sample Questions

Q1) Unable to match request

A)HTTP 400 Bad Request

B)HTTP 403 Forbidden

C)HTTP 404 Not Found

D)HTTP 405 Method Not Allowed

E)HTTP 408 Request Timeout

F)HTTP 500 Internal Server Error

G)HTTP 502 Bad Gateway

H)HTTP 503 Service Unavailable

I)HTTP 504 Gateway Timeout

Q2) Namedroppers is a tool that can be used to capture Web server information and possible vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.

A)True

B)False

Q3) What is "competitive intelligence"?

Q4) As a security tester, should you use social-engineering tactics?

Q5) List at least five tools available for footprinting.

Q6) A(n) ____________________ is a text file generated by a Web server and stored on a user's browser.

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Port Scanning

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41514

Sample Questions

Q1) Why is port scanning useful for hackers?

Q2) does not allow entry or access to a service

A)Nmap

B)pcAnywhere

C)XMAS scan

D)connect scan

E)closed port

F)ACK scan

G)filtered port

H)open port

I)NULL scan

Q3) Why is port scanning considered legal by most security testers and hackers?

Q4) A computer that receives a SYN packet from a remote computer responds to the packet with a(n) ____ packet if its port is open.

A)FIN

B)RST

C)SYN/ACK

D)ACK

Q5) Why is it important for you as a security tester to understand and be able to create scripts?

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Enumeration

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41515

Sample Questions

Q1) ____ is a system process that runs on Windows OSs to facilitate the exchange of network data.

A)NetBIOS

B)Active Directory

C)NetDDE

D)IIS

Q2) ____ implemented Windows File Protection to prevent core system files from being overwritten.

A)Windows 95

B)Windows 98

C)Windows NT 3.51

D)Windows XP Professional

Q3) Windows 98 introduced the ____ file system.

A)FAT16

B)FAT32

C)NTFS

D)ext3

Q4) Why do hackers pay attention to NetBIOS computer name suffixes?

Q5) How does Windows 7 differ from its predecessors?

Q6) What is Hyena and what can it be used for?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Programming for Security Professionals

Available Study Resources on Quizplus for this Chatper

53 Verified Questions

53 Flashcards

Source URL: https://quizplus.com/quiz/41516

Sample Questions

Q1) If you want to know what the Perl print command does, you can use ____.

A)perl -h

B)perldoc -f print

C)perl -h print

D)man perl print

Q2) tells the compiler how to convert a value in a function

A)pseudocode

B)conversion specifier

C)class

D)bug

E)variable

F)do loop

G)compiler

H)while loop

I)gcc

Q3) Security professionals often need to examine Web pages and recognize when something looks suspicious.

A)True

B)False

Q4) What is the difference between the = and = = operators in C?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Desktop and Server Os Vulnerabilities

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41517

Sample Questions

Q1) The MBSA can check for missing security updates.

A)True

B)False

Q2) To perform MBSA-style scans you can run the tool from the command line by using ____________________.exe.

Q3) NetBIOS is not a protocol; it usually works with ____, a fast, efficient protocol that requires little configuration.

A)TCP/IP

B)NBT

C)NetBT

D)NetBEUI

Q4) RPC stands for ________________________.

Q5) Trusted Computer Solutions____ program is used to tighten Linux system security configuration by using templates.

A)OpenVAS

B)MBSA

C)SQL Server

D)Security Blanket

Q6) What is Samba used for?

10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Embedded Operating Systems: The Hidden Threat

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41518

Sample Questions

Q1) What did the botnet worm psyb0t (or the Network Bluepill) target?

Q2) Windows Embedded Standard is essentially Windows CE on a diet.

A)True

B)False

Q3) One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.

A)RTOS

B)VoP

C)MILS

D)SCADA

Q4) widely used embedded OS developed by Wind River Systems

A)Windows Embedded Standard

B)Green Hill Software

C)RTLinux

D)VxWorks

E)RTEMS

F)embedded operating system

G)Quebec

H)QNX

I)SCADA

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Hacking Web Servers

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/41519

Sample Questions

Q1) stands for cross-site scripting flaw

A)WebGoat

B)HTML

C)CGI

D)Cgi Scanner v1.4

E)Apache

F)Wfetch

G)JScript

H)virtual directory

I)XSS

Q2) ____ is the interface that describes how a Web server passes data to a Web browser.

A)Perl

B)ASP

C)CGI

D)PHP

Q3) Web applications written in CFML can also contain other client-side technologies, such as HTML and JavaScript.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Hacking Wireless Networks

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/41520

Sample Questions

Q1) A(n) ____ is a transceiver that connects to a network via an Ethernet cable; it bridges the wireless LAN with the wired network.

A)wireless network interface card (WNIC)

B)switch

C)router

D)access point (AP)

Q2) The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.

A)True

B)False

Q3) A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.

Q4) The default SSID used by Cisco is ____.

A)Tsunami

B)WLAN

C)default

D)linksys

Q5) What is a certificate?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Cryptography

Available Study Resources on Quizplus for this Chatper

58 Verified Questions

58 Flashcards

Source URL: https://quizplus.com/quiz/41521

Sample Questions

Q1) In a ____ attack, the attacker has the ciphertext of several messages that were encrypted with the same encryption algorithm but has no access to the plaintext, so he or she must try to figure out the key used to encrypt the data.

A)chosen-ciphertext

B)chosen-plaintext

C)known plaintext

D)ciphertext-only

Q2) Symmetric algorithms use two keys that are mathematically related.

A)True

B)False

Q3) takes a variable-length input and converts it to a fixed-length output string

A)asymmetric encryption

B)collision free

C)symmetric encryption

D)certificate

E)hashing

F)collision

G)stream cipher

H)message digest

I)block cipher

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Network Protection Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41522

Sample Questions

Q1) A Cisco router uses the Cisco _________________________ System (IOS) to function.

Q2) One goal of a(n) ____ is to have hackers connect to the "phony" computer long enough to be traced.

A)IDS

B)router

C)honeypot

D)firewall

Q3) The ____ of a Cisco router holds the IOS the router is using.

A)RAM

B)NVRAM

C)flash memory

D)ROM

Q4) A honeypot appears to have important data or sensitive information stored on it.

A)True

B)False

Q5) What are the interfaces in a Cisco router?

Q6) What are the advantages and disadvantages of hardware and software firewalls?

Q7) List the components of a Cisco router.

Q8) What is a link-state routing protocol?

To view all questions and flashcards with answers, click on the resource link above. Page 15

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.