CYBR 3200 Review Exam Questions & Answers 2024/2025
Most network threats originate from what? - ANSWERSinside the company
What are some reasons for network attacks? - ANSWERSindustrial espionage, revenge, and financial gain
The capability to prevent one participant in an electronic trans...
CYBR 3200 Review Exam Questions & Answers 2024/2025
Most network threats originate from what? - ANSWERSinside the company
What are some reasons for network attacks? - ANSWERSindustrial espionage, revenge, and financial gain
The capability to prevent one participant in an electronic transition from denying that it performed an action is called ______. - ANSWERSNon-Repudiation
Servers with outside access to the public should be located on ______. - ANSWERSTheir own subnet, a DMZ, a network perimeter
Packet filters can block or allow transmissions of packets based on which of the following criteria? - ANSWERSA port number, IP address
An attacker who causes harm to systems in support of some principle is categorized as what? - ANSWERSCyberterrorist
An IP address combined w/ a TCP/IP port number is called what? - ANSWERSSocket
Firewall enforcement of policies is handled primarily through setting up packet-filtering rules, a set of which is contained in the ______. - ANSWERSRule Base
Name four goals of network security. - ANSWERSConfidentiality, Integrity, Availability, Non-Repudiation
An uninterruptible power supply is a component of _________ security. - ANSWERSPhysical The stuxnet worm was designed to __________. - ANSWERSDisrupt computer-controlled industrial operations
A packet filtering device evaluates data in the payload and compares it with a predefined set of rules. True or false? - ANSWERSFalse
What malware is designed to replicate itself? - ANSWERSWorm, Virus
In a restrictive firewall policy, what is the starting point for developing a rule base? - ANSWERSBlock all traffic
In a IDPS, specific indications of a possible attack are called ______. - ANSWERSSignature
Security devices on a network process digital information, such as text files and Web pages, in the same way. However, what pieces of information might they handle differently? - ANSWERSattack signatures
In what situation can CVE improve the coordination of intrusion information on a network? - ANSWERSInstalling application patches can thwart a reported attack.
What information can be included in a network traffic signature? - ANSWERSlogon attempts, TCP options
What is the name of an error-checking procedure that uses a formula to calculate a numeric value? - ANSWERSchecksum
How do attackers use fragmentation to circumvent network defenses? - ANSWERS-Fragments are crafted
to be too large or too small.
-The initial packet is missing
-The fragments arrive too slowly
What packets should never have a data payload? - ANSWERSone w/ the SYN flag set What is not required for a single-packet attack? - ANSWERSan established connection
What is an example of a multiple-packet attack? - ANSWERSan ICMP flood
What is the purpose of the 4-byte acknowledgement number in a TCP header? - ANSWERSIt acknowledges receipt of the previous packet in the sequence.
What is the correct order in which TCP flags appear during the initiation of a normal connection? - ANSWERSSYN, SYN/ACK, ACK
Which protocol uses one port number to establish a connection and a different port number to transfer data? - ANSWERSFTP
Which of the following is an example of a reconnaissance traffic signature? - ANSWERSping sweep
Which program keeps track of services and ports made available through Remote Procedure Calls? - ANSWERSportmapper
To avoid attacks that use advanced evasion techniques, such as path obfuscation, CGI scripts, and packet injection, you must do what? - ANSWERS-Watch your log files closely.
-Keep your IDPS signature files updated.
What feature distinguishes IPv6 from IPv4? - ANSWERSIPv6 fragmentation occurs only at the source code.
Consider the following statements: A: Dynamic routing protocols decrease network security. B: Static routing protocols conserve network bandwidth.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Bensuda. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £8.18. You're not tied to anything after your purchase.