Deck 9: Cybersecurity: Network and Host Protection

ملء الشاشة (f)
exit full mode
سؤال
I am trying to reach a web server, www.chicago.edu. The response message from the DNS server tells my computer the _____.

A) domain name of the www.chicago.edu server
B) IP address of the www.chicago.edu server
C) IP address of the DNS root server
D) IP address of the DNS authority server
E) MAC address of the www.chicago.edu server
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which command is issued to obtain the IP address of a domain name, "www.sdsu.edu", as in the figure?
<strong>Which command is issued to obtain the IP address of a domain name, www.sdsu.edu, as in the figure?    </strong> A) C:>ipconfig /flushdns www.sdsu.edu B) C:>ipconfig /displaydns C) C:>nslookup www.sdsu.edu D) C:>netstat -n E) C:>ipconfig /all <div style=padding-top: 35px> <strong>Which command is issued to obtain the IP address of a domain name, www.sdsu.edu, as in the figure?    </strong> A) C:>ipconfig /flushdns www.sdsu.edu B) C:>ipconfig /displaydns C) C:>nslookup www.sdsu.edu D) C:>netstat -n E) C:>ipconfig /all <div style=padding-top: 35px>

A) C:>ipconfig /flushdns www.sdsu.edu
B) C:>ipconfig /displaydns
C) C:>nslookup www.sdsu.edu
D) C:>netstat -n
E) C:>ipconfig /all
سؤال
The uniform resource locator (URL) field includes information on:

A) protocol + DNS authority server
B) protocol + domain name
C) domain name + DNS authority server
D) domain name + HTTP server
E) domain name + ISP router address
سؤال
The authoritative server concept applies to the _________ protocol.

A) DHCP
B) HTTP
C) SMTP
D) DNS
E) FTP
سؤال
The 'root' and 'authority' server concepts are relevant to the _________ protocol.

A) DHCP
B) HTTP
C) SMTP
D) DNS
E) FTP
سؤال
The statement, "127.0.0.1 localhost", should be in included in the _________ file of a computer.

A) DHCP
B) HTTP
C) SMTP
D) DNS
E) FTP
سؤال
Which of the following filtering rules is considered a 'complete' rule on a firewall?

A) If source IP = 172.16.x.x to 172.31.x.x or 192.168.x.x.
B) If TCP destination port = 21.‏
C) If HTML message contains 'sex' or 'entertainment'. ‏
D) If destination IP = 161.154.23.59 and TCP port = 25.
E) None of the above
سؤال
Which of the following filtering rules of the firewall is considered a stateful rule ?

A) If source IP = 172.16.x.x to 172.31.x.x or 192.168.x.x, then drop the packet.
B) If TCP destination port = 21, then drop the packet. ‏
C) If the URL = www.darkspace.xxx, then drop the packet.‏
D) If destination IP = 161.154.23.59 and TCP port = 80, then pass the packet.
E) If the source and destination sockets of an arriving packet match those of a session established, then pass the packet.
سؤال
Which filtering rule of a firewall is more likely a 'stateful' rule than the others?

A) If source IP = 172.16.x.x to 172.31.x.x or 192.168.x.x, then drop the packet.
B) If TCP destination port = 21, then allow the packet. ‏
C) If HTML message contains 'sex' or 'entertainment', then drop the packet. ‏
D) If destination IP = 161.154.23.59 and TCP port = 25, then allow the packet.
E) If source=192.168.1.34, dest.=163.43.24.11, source port=1075, dest. port=21, then allow the packet.
سؤال
Choose a CORRECT pairing between a security layer and its corresponding technical solution (remember to choose the most accurate one).

A) Application security -- Hardening intermediary devices
B) Data security -- Host-based firewall
C) Perimeter security -- DMZ (Demilitarized zone)
D) Host security -- Proxy server
E) Internal network security -- Server hardening
سؤال
The following represent technical measures relevant to the host security layer EXCEPT:

A) Host-based intrusion detection
B) Proxy servers
C) Anti-virus protection
D) OS patch/security update management
E) Server hardening (e.g., authentication, and auditing)
سؤال
Which CORRECTLY pairs a security layer and a technology solution?

A) data security - operating system patch management
B) application security - hardening intermediary devices
C) host security - subnetwork segmentations
D) internal network security - corporate-wide data encryption
E) perimeter security - access control list on border routers
سؤال
The ____ packet filtering screens individual packets in isolation.

A) stateful
B) random
C) stateless
D) dynamic
E) independent
سؤال
Which protocol information may be LEAST used by the firewall to filter packets?

A) IP (Internet protocol)
B) TCP (Transport control protocol)
C) UDP (User datagram protocol)
D) ICMP (Internet control message protocol)
E) ARP (Address resolution protocol)
سؤال
The _____ is better positioned to conduct 'deep packet inspection'.

A) host computer firewall
B) application-aware/application layer firewall
C) stateless packet filtering firewall
D) stateful packet filtering firewall
E) access control list of a router
سؤال
Which of the following technologies is NOT used for authentication?

A) Password and passphrase
B) Digital signature and digital certificate
C) Biometric solution (e.g., face recognition).
D) Security token
E) Access control list
سؤال
The intrusion detection and intrusion prevention systems are designed to enable/provide ______.

A) data confidentiality (privacy)
B) data integrity
C) data authentication
D) access control
E) spoofing detection
سؤال
"If destination IP = 161.154.23.59 and TCP port = 25, then pass the packet" is a form of the _____ filtering rule.

A) stateful
B) random
C) stateless
D) dynamic
E) independent
سؤال
The analyst of cyber threat intelligence more likely uses ________ heavily for day-to-day tasks.

A) forward proxy server
B) anti-virus and anti-malware
C) honeypot
D) software defined network
E) security information and event management (SIEM)
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Cybersecurity: Network and Host Protection
1
I am trying to reach a web server, www.chicago.edu. The response message from the DNS server tells my computer the _____.

A) domain name of the www.chicago.edu server
B) IP address of the www.chicago.edu server
C) IP address of the DNS root server
D) IP address of the DNS authority server
E) MAC address of the www.chicago.edu server
B
2
Which command is issued to obtain the IP address of a domain name, "www.sdsu.edu", as in the figure?
<strong>Which command is issued to obtain the IP address of a domain name, www.sdsu.edu, as in the figure?    </strong> A) C:>ipconfig /flushdns www.sdsu.edu B) C:>ipconfig /displaydns C) C:>nslookup www.sdsu.edu D) C:>netstat -n E) C:>ipconfig /all <strong>Which command is issued to obtain the IP address of a domain name, www.sdsu.edu, as in the figure?    </strong> A) C:>ipconfig /flushdns www.sdsu.edu B) C:>ipconfig /displaydns C) C:>nslookup www.sdsu.edu D) C:>netstat -n E) C:>ipconfig /all

A) C:>ipconfig /flushdns www.sdsu.edu
B) C:>ipconfig /displaydns
C) C:>nslookup www.sdsu.edu
D) C:>netstat -n
E) C:>ipconfig /all
C
3
The uniform resource locator (URL) field includes information on:

A) protocol + DNS authority server
B) protocol + domain name
C) domain name + DNS authority server
D) domain name + HTTP server
E) domain name + ISP router address
B
4
The authoritative server concept applies to the _________ protocol.

A) DHCP
B) HTTP
C) SMTP
D) DNS
E) FTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
5
The 'root' and 'authority' server concepts are relevant to the _________ protocol.

A) DHCP
B) HTTP
C) SMTP
D) DNS
E) FTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
6
The statement, "127.0.0.1 localhost", should be in included in the _________ file of a computer.

A) DHCP
B) HTTP
C) SMTP
D) DNS
E) FTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following filtering rules is considered a 'complete' rule on a firewall?

A) If source IP = 172.16.x.x to 172.31.x.x or 192.168.x.x.
B) If TCP destination port = 21.‏
C) If HTML message contains 'sex' or 'entertainment'. ‏
D) If destination IP = 161.154.23.59 and TCP port = 25.
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following filtering rules of the firewall is considered a stateful rule ?

A) If source IP = 172.16.x.x to 172.31.x.x or 192.168.x.x, then drop the packet.
B) If TCP destination port = 21, then drop the packet. ‏
C) If the URL = www.darkspace.xxx, then drop the packet.‏
D) If destination IP = 161.154.23.59 and TCP port = 80, then pass the packet.
E) If the source and destination sockets of an arriving packet match those of a session established, then pass the packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which filtering rule of a firewall is more likely a 'stateful' rule than the others?

A) If source IP = 172.16.x.x to 172.31.x.x or 192.168.x.x, then drop the packet.
B) If TCP destination port = 21, then allow the packet. ‏
C) If HTML message contains 'sex' or 'entertainment', then drop the packet. ‏
D) If destination IP = 161.154.23.59 and TCP port = 25, then allow the packet.
E) If source=192.168.1.34, dest.=163.43.24.11, source port=1075, dest. port=21, then allow the packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
10
Choose a CORRECT pairing between a security layer and its corresponding technical solution (remember to choose the most accurate one).

A) Application security -- Hardening intermediary devices
B) Data security -- Host-based firewall
C) Perimeter security -- DMZ (Demilitarized zone)
D) Host security -- Proxy server
E) Internal network security -- Server hardening
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
11
The following represent technical measures relevant to the host security layer EXCEPT:

A) Host-based intrusion detection
B) Proxy servers
C) Anti-virus protection
D) OS patch/security update management
E) Server hardening (e.g., authentication, and auditing)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which CORRECTLY pairs a security layer and a technology solution?

A) data security - operating system patch management
B) application security - hardening intermediary devices
C) host security - subnetwork segmentations
D) internal network security - corporate-wide data encryption
E) perimeter security - access control list on border routers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
13
The ____ packet filtering screens individual packets in isolation.

A) stateful
B) random
C) stateless
D) dynamic
E) independent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which protocol information may be LEAST used by the firewall to filter packets?

A) IP (Internet protocol)
B) TCP (Transport control protocol)
C) UDP (User datagram protocol)
D) ICMP (Internet control message protocol)
E) ARP (Address resolution protocol)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
15
The _____ is better positioned to conduct 'deep packet inspection'.

A) host computer firewall
B) application-aware/application layer firewall
C) stateless packet filtering firewall
D) stateful packet filtering firewall
E) access control list of a router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following technologies is NOT used for authentication?

A) Password and passphrase
B) Digital signature and digital certificate
C) Biometric solution (e.g., face recognition).
D) Security token
E) Access control list
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
17
The intrusion detection and intrusion prevention systems are designed to enable/provide ______.

A) data confidentiality (privacy)
B) data integrity
C) data authentication
D) access control
E) spoofing detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
18
"If destination IP = 161.154.23.59 and TCP port = 25, then pass the packet" is a form of the _____ filtering rule.

A) stateful
B) random
C) stateless
D) dynamic
E) independent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
19
The analyst of cyber threat intelligence more likely uses ________ heavily for day-to-day tasks.

A) forward proxy server
B) anti-virus and anti-malware
C) honeypot
D) software defined network
E) security information and event management (SIEM)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.