100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Network Pro Chapter 12 Test Questions with Answers $13.39   Add to cart

Exam (elaborations)

Network Pro Chapter 12 Test Questions with Answers

 7 views  0 purchase
  • Course
  • Network Pro
  • Institution
  • Network Pro

Network Pro Chapter 12 Test Questions with Answers What is the definition of any attack involving human interaction of some kind? - Answer-Social Engineering Dumpster diving is a low-tech way of gathering information that may be useful for gaining unauthorized access or as a starting point for ...

[Show more]

Preview 2 out of 8  pages

  • August 10, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • network pro
  • Network Pro
  • Network Pro
avatar-seller
Scholarsstudyguide
Network Pro Chapter 12 Test Questions
with Answers
What is the definition of any attack involving human interaction of some kind? - Answer-
Social Engineering

Dumpster diving is a low-tech way of gathering information that may be useful for
gaining unauthorized access or as a starting point for more advanced attacks. How can
a company reduce the risk associated with dumpster diving? - Answer-Establish and
enforce a document destruction policy.

You have just received a generic-looking email that is addressed as coming from the
administrator of your company. The email says that as part of a system upgrade, you
need enter your username and password in a new website so you can manage your
email and spam using the new service.
What should you do? - Answer-Verify that the email was sent by the administrator and
that this new service is legitimate.

Which of the following is a common social engineering attack? - Answer-Hoax virus
information emails.

On your way into the back entrance of your work building one morning, a man dressed
as a plumber asks you to let him in so he can fix the restroom. What should you do? -
Answer-Direct him to the front entrance and instruct him to check in with the
receptionist.

Which of the following are examples of social engineering attacks? (Select two.) -
Answer-Dumpster diving

Shoulder surfing

A senior executive reports that she received a suspicious email concerning a sensitive
internal project that is behind production. The email was sent from someone she doesn't
know, and he is asking for immediate clarification on several of the project's details so
the project can get back on schedule.
Which type of attack BEST describes the scenario? - Answer-Whaling

While browsing the internet, you notice that the browser displays ads linked to recent
keyword searches you performed.
Which attack type is this an example of? - Answer-Adware

, What should you try first if your antivirus software does not detect and remove a virus? -
Answer-Update your virus detection software.

Which of the following best describes spyware? - Answer-It monitors the actions you
take on your machine and sends the information back to its originating source.

What is the main difference between a worm and a virus? - Answer-A worm can
replicate itself, while a virus requires a host for distribution.

Which of the following BEST describes the key difference between DoS and DDoS? -
Answer-Attackers use numerous computers and connections.

Which type of denial-of-service (DoS) attack occurs when a name server receives
malicious or misleading data that incorrectly maps hostnames to IP addresses? -
Answer-DNS poisoning

Which of the following is an attack that either exploits a software flaw or floods a system
with traffic in order to prevent legitimate activities or transactions from occurring? -
Answer-Denial-of-service attack


Which of the following BEST describes an inside attacker? - Answer-An unintentional
threat actor (the most common threat).

Which of the following is an example of an internal threat? - Answer-A user accidentally
deletes the new product designs.

Telnet is inherently unsecure because its communication is in plaintext and is easily
intercepted. Which of the following is an acceptable alternative to Telnet? - Answer-SSH

Which of the following protocols can you use to securely manage a network device from
a remote connection? - Answer-SSH

Which protocol does HTTPS use to offer greater security for web transactions? -
Answer-SSL

You want to allow traveling users to connect to your private network through the
internet. Users will connect from various locations, including airports, hotels, and public
access points (like coffee shops and libraries). As such, you won't be able to configure
the firewalls that might be controlling access to the internet in these locations.
Which of the following protocols is MOST likely to be allowed through the widest
number of firewalls? - Answer-SSL

Which of the following protocols are often added to other protocols to provide secure
data transmission? (Select two.) - Answer-TLS
SSL

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.39. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80202 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.39
  • (0)
  Add to cart