Deck 23: Security Software

ملء الشاشة (f)
exit full mode
سؤال
Cracking a password can take many different routes.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
There are only two ways to help prevent a password from being cracked.
سؤال
Capturing packets is also referred to as ____.

A) packet stiffing
B) packet sniffing
C) packet hiding
D) packet blocking
سؤال
A ____ is an alert given when normal, non-malicious traffic happens to match one or more rules for malicious traffic.

A) false negative
B) true negative
C) true positive
D) false positive
سؤال
A(n) ____________________ describes the steps needed to execute the policy.
سؤال
____ is a vulnerability scanner that will scan the host system, or any and all computers on the local network or anywhere on the Internet.

A) GFI LANguard
B) NetCat
C) L0phtCrack
D) Brutus
سؤال
The ____ technique tries all combinations of letters, numbers, and symbols until eventually landing on the correct password.

A) dictionary
B) brute force
C) computed hash
D) linear hash
سؤال
The command ____ translates certain names into their associated IP addresses or port numbers.

A) netstat -n
B) netstat -r -n
C) netstat -a
D) netstat -a -n
سؤال
Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.
سؤال
A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.

A) DDOS
B) DOS
C) DDOD
D) DOD
سؤال
When the network adapter is placed into promiscuous mode, it allows all received packets to pass up into the TCP/IP stack.
سؤال
Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.
سؤال
A ____ provides the rules and expectations and the consequences of not following the rules.

A) password policy
B) software policy
C) security policy
D) network policy
سؤال
A(n) ____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email, instant message, or some other communication.
سؤال
A list of ports that are in use can be obtained through the ____ utility.

A) NBTSTAT
B) IPCONFIG
C) NETSTAT
D) TCPSTAT
سؤال
One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.

A) block port
B) pan port
C) management port
D) mirror port
سؤال
In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n) ____ is made available.

A) Internet Rights Policy
B) Acceptable Use Policy
C) Internet Abuse Policy
D) Standard Rights Policy
سؤال
The most common approaches to password ____________________ are guessing, brute force, and dictionary attacks.
سؤال
Security policies and procedures should be static.
سؤال
A(n) ____________________ will take action on its own to handle the problem without user intervention, such as interrupting the offending traffic.
سؤال
How do you prevent booting from a USB thumb drive?
سؤال
Match between columns
Composed of information commonly known about the individual
Weak password
Composed of information commonly known about the individual
Brute force
Composed of information commonly known about the individual
Dictionary attack
Composed of information commonly known about the individual
Intrusion detection
Composed of information commonly known about the individual
Snort
Typically the most time consuming way to crack a password
Weak password
Typically the most time consuming way to crack a password
Brute force
Typically the most time consuming way to crack a password
Dictionary attack
Typically the most time consuming way to crack a password
Intrusion detection
Typically the most time consuming way to crack a password
Snort
Uses a list of common passwords to try to crack an unknown password
Weak password
Uses a list of common passwords to try to crack an unknown password
Brute force
Uses a list of common passwords to try to crack an unknown password
Dictionary attack
Uses a list of common passwords to try to crack an unknown password
Intrusion detection
Uses a list of common passwords to try to crack an unknown password
Snort
Examines network traffic for known attack signatures
Weak password
Examines network traffic for known attack signatures
Brute force
Examines network traffic for known attack signatures
Dictionary attack
Examines network traffic for known attack signatures
Intrusion detection
Examines network traffic for known attack signatures
Snort
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Weak password
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Brute force
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Dictionary attack
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Intrusion detection
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Snort
سؤال
Discuss the process of guessing a password.
سؤال
Describe the educational, diagnostics, network baseline measurements, and security reasons to capture network traffic.
سؤال
List and describe what a typical AUP contains.
سؤال
Describe host-based intrusion detection.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 23: Security Software
1
Cracking a password can take many different routes.
True
2
There are only two ways to help prevent a password from being cracked.
False
3
Capturing packets is also referred to as ____.

A) packet stiffing
B) packet sniffing
C) packet hiding
D) packet blocking
B
4
A ____ is an alert given when normal, non-malicious traffic happens to match one or more rules for malicious traffic.

A) false negative
B) true negative
C) true positive
D) false positive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n) ____________________ describes the steps needed to execute the policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ is a vulnerability scanner that will scan the host system, or any and all computers on the local network or anywhere on the Internet.

A) GFI LANguard
B) NetCat
C) L0phtCrack
D) Brutus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ technique tries all combinations of letters, numbers, and symbols until eventually landing on the correct password.

A) dictionary
B) brute force
C) computed hash
D) linear hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
8
The command ____ translates certain names into their associated IP addresses or port numbers.

A) netstat -n
B) netstat -r -n
C) netstat -a
D) netstat -a -n
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
9
Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
10
A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.

A) DDOS
B) DOS
C) DDOD
D) DOD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
11
When the network adapter is placed into promiscuous mode, it allows all received packets to pass up into the TCP/IP stack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
12
Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
13
A ____ provides the rules and expectations and the consequences of not following the rules.

A) password policy
B) software policy
C) security policy
D) network policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
14
A(n) ____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email, instant message, or some other communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
15
A list of ports that are in use can be obtained through the ____ utility.

A) NBTSTAT
B) IPCONFIG
C) NETSTAT
D) TCPSTAT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
16
One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.

A) block port
B) pan port
C) management port
D) mirror port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
17
In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n) ____ is made available.

A) Internet Rights Policy
B) Acceptable Use Policy
C) Internet Abuse Policy
D) Standard Rights Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
18
The most common approaches to password ____________________ are guessing, brute force, and dictionary attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
19
Security policies and procedures should be static.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
20
A(n) ____________________ will take action on its own to handle the problem without user intervention, such as interrupting the offending traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
21
How do you prevent booting from a USB thumb drive?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match between columns
Composed of information commonly known about the individual
Weak password
Composed of information commonly known about the individual
Brute force
Composed of information commonly known about the individual
Dictionary attack
Composed of information commonly known about the individual
Intrusion detection
Composed of information commonly known about the individual
Snort
Typically the most time consuming way to crack a password
Weak password
Typically the most time consuming way to crack a password
Brute force
Typically the most time consuming way to crack a password
Dictionary attack
Typically the most time consuming way to crack a password
Intrusion detection
Typically the most time consuming way to crack a password
Snort
Uses a list of common passwords to try to crack an unknown password
Weak password
Uses a list of common passwords to try to crack an unknown password
Brute force
Uses a list of common passwords to try to crack an unknown password
Dictionary attack
Uses a list of common passwords to try to crack an unknown password
Intrusion detection
Uses a list of common passwords to try to crack an unknown password
Snort
Examines network traffic for known attack signatures
Weak password
Examines network traffic for known attack signatures
Brute force
Examines network traffic for known attack signatures
Dictionary attack
Examines network traffic for known attack signatures
Intrusion detection
Examines network traffic for known attack signatures
Snort
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Weak password
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Brute force
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Dictionary attack
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Intrusion detection
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Snort
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
23
Discuss the process of guessing a password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
24
Describe the educational, diagnostics, network baseline measurements, and security reasons to capture network traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
25
List and describe what a typical AUP contains.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe host-based intrusion detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.