Network Pro Chapter 12 Test Questions with Answers
7 views 0 purchase
Course
Network Pro
Institution
Network Pro
Network Pro Chapter 12 Test Questions with Answers
What is the definition of any attack involving human interaction of some kind? - Answer-Social Engineering
Dumpster diving is a low-tech way of gathering information that may be useful for gaining unauthorized access or as a starting point for ...
Network Pro Chapter 12 Test Questions
with Answers
What is the definition of any attack involving human interaction of some kind? - Answer-
Social Engineering
Dumpster diving is a low-tech way of gathering information that may be useful for
gaining unauthorized access or as a starting point for more advanced attacks. How can
a company reduce the risk associated with dumpster diving? - Answer-Establish and
enforce a document destruction policy.
You have just received a generic-looking email that is addressed as coming from the
administrator of your company. The email says that as part of a system upgrade, you
need enter your username and password in a new website so you can manage your
email and spam using the new service.
What should you do? - Answer-Verify that the email was sent by the administrator and
that this new service is legitimate.
Which of the following is a common social engineering attack? - Answer-Hoax virus
information emails.
On your way into the back entrance of your work building one morning, a man dressed
as a plumber asks you to let him in so he can fix the restroom. What should you do? -
Answer-Direct him to the front entrance and instruct him to check in with the
receptionist.
Which of the following are examples of social engineering attacks? (Select two.) -
Answer-Dumpster diving
Shoulder surfing
A senior executive reports that she received a suspicious email concerning a sensitive
internal project that is behind production. The email was sent from someone she doesn't
know, and he is asking for immediate clarification on several of the project's details so
the project can get back on schedule.
Which type of attack BEST describes the scenario? - Answer-Whaling
While browsing the internet, you notice that the browser displays ads linked to recent
keyword searches you performed.
Which attack type is this an example of? - Answer-Adware
, What should you try first if your antivirus software does not detect and remove a virus? -
Answer-Update your virus detection software.
Which of the following best describes spyware? - Answer-It monitors the actions you
take on your machine and sends the information back to its originating source.
What is the main difference between a worm and a virus? - Answer-A worm can
replicate itself, while a virus requires a host for distribution.
Which of the following BEST describes the key difference between DoS and DDoS? -
Answer-Attackers use numerous computers and connections.
Which type of denial-of-service (DoS) attack occurs when a name server receives
malicious or misleading data that incorrectly maps hostnames to IP addresses? -
Answer-DNS poisoning
Which of the following is an attack that either exploits a software flaw or floods a system
with traffic in order to prevent legitimate activities or transactions from occurring? -
Answer-Denial-of-service attack
Which of the following BEST describes an inside attacker? - Answer-An unintentional
threat actor (the most common threat).
Which of the following is an example of an internal threat? - Answer-A user accidentally
deletes the new product designs.
Telnet is inherently unsecure because its communication is in plaintext and is easily
intercepted. Which of the following is an acceptable alternative to Telnet? - Answer-SSH
Which of the following protocols can you use to securely manage a network device from
a remote connection? - Answer-SSH
Which protocol does HTTPS use to offer greater security for web transactions? -
Answer-SSL
You want to allow traveling users to connect to your private network through the
internet. Users will connect from various locations, including airports, hotels, and public
access points (like coffee shops and libraries). As such, you won't be able to configure
the firewalls that might be controlling access to the internet in these locations.
Which of the following protocols is MOST likely to be allowed through the widest
number of firewalls? - Answer-SSL
Which of the following protocols are often added to other protocols to provide secure
data transmission? (Select two.) - Answer-TLS
SSL
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.39. You're not tied to anything after your purchase.