100%(5)5 out of 5 people found this document helpful
This preview shows page 1 - 2 out of 4 pages.
Ch 81.Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?d. Posture assessment (p385)2.What wireless attack might a potential hacker execute with a specially configured transmitter?a. Jamming (p388)3.What kind of vulnerability is exploited by a ping of death?b. Buffer overflow (p390)4.Which type of DoS (Denial-of-Service) attack orchestrates an attack using uninfected computers?a. DRDoS(disturbed DoS)attack (p392)5.What software might be installed on a device in order to authenticate it to the network?d. Agent (p399)6.What feature of Windows Server allows for agentless authentication?a. Active Directory (p400)7.What kind of firewall blocks traffic based on application data contained within the packets?b. Content-filtering firewall (p407)8.What of the following features does NOT distinguish an NGFW from traditional firewalls?d. UTM(Unified Threat Management) (p407)9.At what layer of the OSI model do proxy servers operate?c. Layer 7 (p411 Application Layer)10.What kind of virus runs in place of the computer’s normal system files? d. Boot sector viruses (p415)11.What unique characteristic of zero-day exploits make them so dangerous?12.What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?13.A neighbor hacks into your secured wireless network on a regular basis, but you didn’t give him the password. What loophole was most likely left open?