CYSE 101 FINAL REVIEW(2023 updated)fully solved UPDATED
CYSE 101 FINAL REVIEW(2023 updated)fully solved UPDATEDWhat Kismet used for? - correct answer Finding wireless access points even when attempts have made it difficult to do so. What is the concept of network segmentation and why do it? - correct answer Divide networks into subnets. Do this for controlling network traffic. Boost Performance. Troubleshooting network issues. Why is a BYOD policy bad for an enterprise network? - correct answer Potential for malware to be brought into the network from outside sources is high. Rogue access points. Three main protocols of wire encryption? - correct answer WEP, WPA, WPA2 What application might we use to scan for devices on a network, fingerprint operating systems, and detecting versions of services on open ports? - correct answer Nmap Why use a honeypot? - correct answer Giving attackers a vulnerable target to direct attacks at instead of the client network, analyze malware in the wild to better protect our client network. Different between signature and anomaly IDSes? - correct answer Signature based IDSes used a database of signatures generated from already encountered malware. Anomaly base IDSes track abnormal network traffic to detect attacks. (better at detecting newer attacks) What technology may use to send sensitive data over an untrusted network? - correct answer VPN
Written for
- Institution
- CYSE
- Course
- CYSE
Document information
- Uploaded on
- April 22, 2024
- Number of pages
- 6
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cyse 101 final review2023 updatedfully solved
-
cyse 101 final review2023 updatedfully solved up
Also available in package deal