Networking Chapter 12 Flood Broadcast Amplification Attacks And Buffer Overflow Dosrelated Brute Forcerelated Maninthemiddlerelated Servicerelated

subject Type Homework Help
subject Pages 9
subject Words 2719
subject Authors Ed Tittel, James Pyles, Jeffrey L. Carrell

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 1
Indicate whether the statement is true or false.
1. When users from outside the network attach to a service inside the network, they actually attach to the proxy
server, which establishes a proxy session into the private side of the network from there.
a.
True
b.
False
2. Proxy server software permits internal network addresses to be "translated" into public network addresses
when packets leave inside networks so only public IP addresses are exposed on the public Internet.
a.
True
b.
False
3. A stealthy attacker may cover its tracks by deleting log files, or terminating any active direct connections.
a.
True
b.
False
4. Strictly speaking, VPNs use tunneling protocols; therefore, they need to encrypt tunneled traffic.
a.
True
b.
False
5. Fundamental protocols-including IP and TCP or UDP-offer no built-in security controls.
a.
True
b.
False
Indicate the answer choice that best completes the statement or answers the question.
6. Which type of attacks are designed to interrupt or completely disrupt operations of a network device or
network communications?
a.
Trojan horse attacks
b.
Dictionary attacks
c.
DoS attacks
d.
Worms
7. Which of the following is an undocumented and illicit point of entry into an operating system or application
added by a system's programmers to bypass normal security?
a.
back door
b.
hole
c.
discovery
d.
hash
8. In how many minutes can any knowledgeable systems professional with the right toolkit break into just about
any system if allowed unsupervised and unrestricted access to the computer on which such a system resides?
a.
15 minutes
b.
20 minutes
page-pf2
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 2
c.
25 minutes
d.
30 minutes
9. Which of the following reveals a system vulnerability and is often documented, either by the manufacturer or
by an attacker?
a.
hole
b.
exploit
c.
break-in
d.
attack
10. Which type of device makes access control decisions on the basis of application content rather than by
looking at IP addresses or port numbers and can act on a host to deny potentially malicious activity?
a.
Firewall
b.
IPS
c.
IDS
d.
Proxy
11. Which of the following is unsolicited and unwanted software that takes up stealthy unauthorized and
uninvited residence on a computer?
a.
SA bundle
b.
Spyware
c.
Adware
d.
Cache
12. Which of the following terms is a hardened computer specifically designed to resist and oppose illicit or
unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks?
a.
firewall
b.
bastion host
c.
DMZ
d.
boundary router
13. Which of the following refers to a successful attempt to compromise a system's security?
a.
discovery
b.
exploit
c.
break-in
d.
gateway
14. Which of the following serves the purpose of finding out what you have and what is vulnerable?
a.
reconnaissance
b.
covering-up
c.
session hijacking
d.
packet sniffing
page-pf3
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 3
15. Which type of attack includes SYN Flood, broadcast amplification attacks, and buffer overflow?
a.
DoS-related
b.
Brute force-related
c.
Man-in-the-middle-related
d.
IP service-related
16. Which of the following terms means restricting who may view or use certain resources, including access to
bandwidth or a computer, as well as access to information?
a.
Access control
b.
Connectionless integrity
c.
Data origin authentication
d.
Confidentiality
17. Which of the following is the ability to verify that the data received did in fact come from the named source?
a.
Access control
b.
Connectionless integrity
c.
Data origin authentication
d.
Confidentiality
18. Which of the following types of attacks serves the purpose of masquerading as an authorized user in order to
gain access to a system?
a.
egress filtering
b.
session hijacking
c.
data authentication
d.
network sniffing
19. Which of the following is a process of borrowing identity information, such as an IP address, domain name,
NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities?
a.
Ingress filtering
b.
Data authentication
c.
Network sniffing
d.
Spoofing
20. Which of the following is a weak spot or known place of attack on any common operating system,
application, or service?
a.
back door
b.
hole
c.
discovery
d.
hash
21. Which of the following is a type of software that opens the door for a compromised machine to display all
page-pf4
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 4
kinds of unsolicited and unwanted advertising, often of an unsavory nature?
a.
SA bundle
b.
Spyware
c.
Adware
d.
Cache
22. In which of the following attacks is the attacker able to intercept traffic from both parties and either pass the
traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side?
a.
DoS attack
b.
brute force attack
c.
man-in-the middle attack
d.
IP service attack
23. Which of the following is a specially "hardened" software service or software/hardware product that erects a
barrier to inspect and control traffic flow between networks?
a.
firewall
b.
bastion host
c.
DMZ
d.
boundary router
24. Which of the following best defines an attempt to snoop inside traffic moving across the Internet to look for
unprotected account and password information, or to obtain other sensitive information while it's in transit?
a.
brute force attack
b.
user impersonation
c.
session hijacking
d.
packet sniffing
25. Which of the following software programs can attempt to communicate with any IP-based system while
cycling through all valid TCP and UDP port addresses?
a.
agent
b.
Trojan
c.
port scanner
d.
socket
26. Which of the following is an area that's accessible to both outsiders and insiders, but which establishes a
buffer area between what's completely inside and outside a network boundary?
a.
firewall
b.
bastion host
c.
DMZ
d.
boundary router
Enter the appropriate word(s) to complete the statement.
page-pf5
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 5
27. In a(n) ____________________ attack, a service is inundated with requests, or malformed service requests,
which cause a server to hang or freeze, preventing it from responding to input.
28. A(n) ____________________ is a weakness in an information system, system security procedures, internal
controls, or implementation that could be exploited by a threat source.
29. ____________________ attacks are DoS attacks that are launched from numerous devices.
30. A(n) ____________________ model excludes users from access to resources, by default, and then adds
whatever users need access to such resources as exceptions to the general exclusionary rule.
31. A(n) ____________________ consists of creating hashed values for all words in a specialized dictionary of
terms, then comparing those values to the hashed values in password files.
Match each item with a statement below.
a.
threat
b.
remote logon service
c.
PING sweep
d.
computer forensics
e.
port scanner
f.
handler
g.
session hijacking
h.
security policy
i.
honeypot
32. any activity that represents a potential danger or attack on a system or network
33. any type of network service that permits users elsewhere on a network to use the network to log on to a
system as if they were attached locally while operating remotely
34. an ICMP Echo-based operation used to locate active devices on a network
35. the process of examining the "footprints" that an attacker leaves behind
36. a special-purpose software tool that cycles through all possible TCP and UDP port addresses looking for
open ports that then can be probed for access or exploited for vulnerabilities
37. a manager system in a DDoS attack
38. an IP attack technique whereby an impostor takes over an ongoing communications session between a client
and server
39. a document that represents the concrete manifestation of an organization's requirements for security
practices, rules, and procedures
page-pf6
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 6
40. a computer system deliberately set up to attract, entice, and entrap would-be attackers, often by being made
to appear part of a larger network
41. Briefly define proxy server, screening host, and screening router.
42. According to RFC 4301, what are the goals of IPSec?
43. What is meant by the term buffer overflow?
44. Briefly describe the following types of attacks: DoS, man-in-the-middle, and IP service.
45. What are the steps when planning and implementing firewalls and proxy servers on your networks?
46. What is the difference between an attack and an exploit?
47. Provide a brief definition of spoofing.
48. Discuss the risks of allowing anonymous access.
49. Discuss the difference between physical security and personnel security.
50. Briefly describe IP service implementation vulnerabilities, and insecure IP protocols and services.
page-pf7
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 7
page-pf8
Name:
Class:
Date:
page-pf9
Name:
Class:
Date:
page-pfa
Name:
Class:
Date:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.