

![]()


Network Defense focuses on the strategies, tools, and best practices used to protect computer networks from unauthorized access, attacks, and data breaches. Students will explore topics such as firewalls, intrusion detection and prevention systems, access control mechanisms, network segmentation, security protocols, and vulnerability management. The course emphasizes hands-on experience through practical labs and simulations, enabling students to design, implement, and monitor defensive measures that help safeguard corporate and organizational networks. Security policies, incident response, and ethical and legal considerations in network defense are also discussed to provide a comprehensive understanding of the field.
Recommended Textbook
Hands On Ethical Hacking and Network Defense 2nd Edition by Michael T. Simpson
Available Study Resources on Quizplus
13 Chapters
673 Verified Questions
673 Flashcards
Source URL: https://quizplus.com/study-set/2085 Page 2

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41510
Sample Questions
Q1) In the ____ model, management does not divulge to staff that penetration testing is being conducted, nor does it give the tester any diagrams or describe what technologies the company is using.
A)gray box
B)white box
C)black box
D)red box
Answer: C
Q2) A ____ can be created that welcomes new users joining a chat session, even though a person isn't actually present to welcome them.
A)byte
B)packet
C)switch
D)bot
Answer: D
Q3) Employees of a security company are protected under the company's ____________________ with the client.
Answer: contract
To view all questions and flashcards with answers, click on the resource link above. Page 3

Available Study Resources on Quizplus for this Chatper
57 Verified Questions
57 Flashcards
Source URL: https://quizplus.com/quiz/41511
Sample Questions
Q1) An octet is equal to ____________________ bits, which equals one byte. Answer: eight
Q2) No matter what medium connects computers on a network-copper wires, fiber-optic cables, or a wireless setup-the same protocol must be running on all computers if communication is going to function correctly.
A)True
B)False
Answer: True
Q3) In TCP, the ______________________________ is a 32-bit number that tracks the packets received by the node and allows reassembling of large packets that have been broken up into smaller packets. Answer: initial sequence number (ISN)
ISN initial sequence number
Q4) To retrieve e-mail from a mail server, you most likely access port 119. A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 4

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41512
Q1) What is the most important recommendation that should be made to a client to help prevent viruses from being introduced into corporate networks?
Answer: To help prevent viruses from being introduced into corporate networks,the most important recommendation you should make to a client is to update virus signature files as soon as they're available from the vendor.Most antivirus software does this automatically or prompts the user to do so.An organization can't depend on employee vigilance to protect its systems,so centralizing all antivirus software updates from a corporate server is prudent.
Q2) ____ is concerned with the security of computers or devices that are part of a network infrastructure.
A)Attack security
B)Cybercrime
C)Computer security
D)Network security
Answer: D
Q3) ____________________ is defined as securing a stand-alone computer that's not part of a network infrastructure.
Answer: Computer security
To view all questions and flashcards with answers, click on the resource link above.
5

Available Study Resources on Quizplus for this Chatper
51 Verified Questions
51 Flashcards
Source URL: https://quizplus.com/quiz/41513
Sample Questions
Q1) Unable to match request
A)HTTP 400 Bad Request
B)HTTP 403 Forbidden
C)HTTP 404 Not Found
D)HTTP 405 Method Not Allowed
E)HTTP 408 Request Timeout
F)HTTP 500 Internal Server Error
G)HTTP 502 Bad Gateway
H)HTTP 503 Service Unavailable
I)HTTP 504 Gateway Timeout
Q2) Namedroppers is a tool that can be used to capture Web server information and possible vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.
A)True
B)False
Q3) What is "competitive intelligence"?
Q4) As a security tester, should you use social-engineering tactics?
Q5) List at least five tools available for footprinting.
Q6) A(n) ____________________ is a text file generated by a Web server and stored on a user's browser.
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41514
Sample Questions
Q1) Why is port scanning useful for hackers?
Q2) does not allow entry or access to a service
A)Nmap
B)pcAnywhere
C)XMAS scan
D)connect scan
E)closed port
F)ACK scan
G)filtered port
H)open port
I)NULL scan
Q3) Why is port scanning considered legal by most security testers and hackers?
Q4) A computer that receives a SYN packet from a remote computer responds to the packet with a(n) ____ packet if its port is open.
A)FIN
B)RST
C)SYN/ACK
D)ACK
Q5) Why is it important for you as a security tester to understand and be able to create scripts?
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41515
Sample Questions
Q1) ____ is a system process that runs on Windows OSs to facilitate the exchange of network data.
A)NetBIOS
B)Active Directory
C)NetDDE
D)IIS
Q2) ____ implemented Windows File Protection to prevent core system files from being overwritten.
A)Windows 95
B)Windows 98
C)Windows NT 3.51
D)Windows XP Professional
Q3) Windows 98 introduced the ____ file system.
A)FAT16
B)FAT32
C)NTFS
D)ext3
Q4) Why do hackers pay attention to NetBIOS computer name suffixes?
Q5) How does Windows 7 differ from its predecessors?
Q6) What is Hyena and what can it be used for?
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
53 Verified Questions
53 Flashcards
Source URL: https://quizplus.com/quiz/41516
Sample Questions
Q1) If you want to know what the Perl print command does, you can use ____.
A)perl -h
B)perldoc -f print
C)perl -h print
D)man perl print
Q2) tells the compiler how to convert a value in a function
A)pseudocode
B)conversion specifier
C)class
D)bug
E)variable
F)do loop
G)compiler
H)while loop
I)gcc
Q3) Security professionals often need to examine Web pages and recognize when something looks suspicious.
A)True
B)False
Q4) What is the difference between the = and = = operators in C?
To view all questions and flashcards with answers, click on the resource link above. Page 9
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41517
Sample Questions
Q1) The MBSA can check for missing security updates.
A)True
B)False
Q2) To perform MBSA-style scans you can run the tool from the command line by using ____________________.exe.
Q3) NetBIOS is not a protocol; it usually works with ____, a fast, efficient protocol that requires little configuration.
A)TCP/IP
B)NBT
C)NetBT
D)NetBEUI
Q4) RPC stands for ________________________.
Q5) Trusted Computer Solutions____ program is used to tighten Linux system security configuration by using templates.
A)OpenVAS
B)MBSA
C)SQL Server
D)Security Blanket
Q6) What is Samba used for?

10
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41518
Sample Questions
Q1) What did the botnet worm psyb0t (or the Network Bluepill) target?
Q2) Windows Embedded Standard is essentially Windows CE on a diet.
A)True
B)False
Q3) One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.
A)RTOS
B)VoP
C)MILS
D)SCADA
Q4) widely used embedded OS developed by Wind River Systems
A)Windows Embedded Standard
B)Green Hill Software
C)RTLinux
D)VxWorks
E)RTEMS
F)embedded operating system
G)Quebec
H)QNX
I)SCADA
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/41519
Sample Questions
Q1) stands for cross-site scripting flaw
A)WebGoat
B)HTML
C)CGI
D)Cgi Scanner v1.4
E)Apache
F)Wfetch
G)JScript
H)virtual directory
I)XSS
Q2) ____ is the interface that describes how a Web server passes data to a Web browser.
A)Perl
B)ASP
C)CGI
D)PHP
Q3) Web applications written in CFML can also contain other client-side technologies, such as HTML and JavaScript.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12

Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/41520
Sample Questions
Q1) A(n) ____ is a transceiver that connects to a network via an Ethernet cable; it bridges the wireless LAN with the wired network.
A)wireless network interface card (WNIC)
B)switch
C)router
D)access point (AP)
Q2) The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.
A)True
B)False
Q3) A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.
Q4) The default SSID used by Cisco is ____.
A)Tsunami
B)WLAN
C)default
D)linksys
Q5) What is a certificate?
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
58 Verified Questions
58 Flashcards
Source URL: https://quizplus.com/quiz/41521
Sample Questions
Q1) In a ____ attack, the attacker has the ciphertext of several messages that were encrypted with the same encryption algorithm but has no access to the plaintext, so he or she must try to figure out the key used to encrypt the data.
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
Q2) Symmetric algorithms use two keys that are mathematically related.
A)True
B)False
Q3) takes a variable-length input and converts it to a fixed-length output string
A)asymmetric encryption
B)collision free
C)symmetric encryption
D)certificate
E)hashing
F)collision
G)stream cipher
H)message digest
I)block cipher
To view all questions and flashcards with answers, click on the resource link above. Page 14

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41522
Sample Questions
Q1) A Cisco router uses the Cisco _________________________ System (IOS) to function.
Q2) One goal of a(n) ____ is to have hackers connect to the "phony" computer long enough to be traced.
A)IDS
B)router
C)honeypot
D)firewall
Q3) The ____ of a Cisco router holds the IOS the router is using.
A)RAM
B)NVRAM
C)flash memory
D)ROM
Q4) A honeypot appears to have important data or sensitive information stored on it.
A)True
B)False
Q5) What are the interfaces in a Cisco router?
Q6) What are the advantages and disadvantages of hardware and software firewalls?
Q7) List the components of a Cisco router.
Q8) What is a link-state routing protocol?
To view all questions and flashcards with answers, click on the resource link above. Page 15