Skip to main content

IS5403 Week 3 All Quizezz

2
Question

What can be deployed to intercept and log network traffic passing through the network?

Correct
 
2 of 5
3
Question

What attack involves impersonating another device?

Correct
 
3 of 5
4
Question

Packet sniffing can be helpful in detecting rogues.

Correct
 
4 of 5
5
Question

Which of the following is NOT a means used by an attacker to do reconnaissance on a network?

Correct
What is a session token?
CORRECT


Which attack uses the user's web browser settings to impersonate that user?
CORRECT
John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing?
CORRECT
What is the basis of an SQL injection attack?
CORRECT
Which attack intercepts communications between a web browser and the underlying computer?
CORRECT
What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another?
CORRECT
Attackers who register domain names that are similar to legitimate domain names are performing _____.
CORRECT
What type of attack intercepts legitimate communication and forges a fictitious response to the sender?
CORRECT
A replay attack _____.
CORRECT
An attacker who manipulates the maximum size of an integer type would be performing what kind of attack?
CORRECT
Which of these is NOT a DoS attack?
CORRECT
What is the difference between a DoS and a DDoS attack?
CORRECT
Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect?
CORRECT
DNS poisoning _____.
CORRECT
Why are extensions, plug-ins, and add-ons considered to be security risks?
CORRECT

Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks?
CORRECT
Which action cannot be performed through a successful SQL injection attack?
CORRECT
What type of attack involves manipulating third-party ad networks?
CORRECT
Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about?
CORRECT
Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser?
CORRECT
How does network address translation (NAT) improve security?
CORRECT
Which statement regarding a demilitarized zone (DMZ) is NOT true?
CORRECT
Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose?
CORRECT
Which device intercepts internal user requests and then processes those requests on behalf of the users?
CORRECT
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization's secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?
CORRECT
In which of the following configurations are all the load balancers always active?
CORRECT
Which device watches for attacks and sounds an alert only when one occurs?
CORRECT
Which of the following is a multipurpose security device?
CORRECT
Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian?
CORRECT
Which function does an Internet content filter NOT perform?
CORRECT
Which of the following devices can identify the application that sends packets and then makes decisions about filtering based on it?
CORRECT

Which of the following CANNOT be used to hide information about the internal network?
CORRECT
Which statement about network address translation (NAT) is true?
CORRECT
Which device is easiest for an attacker to take advantage of to capture and analyze packets?
CORRECT
Which of these would NOT be a filtering mechanism found in a firewall ACL rule?
CORRECT

Which of these is NOT used in scheduling a load balancer?
CORRECT
Which is the most secure type of firewall?
CORRECT
Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?
CORRECT
Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?
CORRECT
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
CORRECT









































































































































































































































 

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh