quizs questions - 1. Question: (TCO 1) In a masquerade...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1. Question: (TCO 1) In a masquerade attack, what does an attacker steal when pretending to come from a trusted host? Your Answer: account identification INCORRECT IP address CORRECT ANSWER User Group User password Question: (TCO 1) What is IP spoofing? Your Answer: Question: (TCO 1) In a re-routing attack, what router table is modified or prevented from updating? Your Answer: Question: (TCO 1) What attack is most often used in Social Engineering? Your Answer: Question: (TCO 1) In a Masquerade attack, the attacker pretends to be a trusted host by using a valid hosts _____. Your Answer: Question: (TCO 1) TCP SYN flooding attach effects can be reduced or eliminated by Your Answer: Question: (TCO 1) Which one of the following is a configuration weakness? Your Answer: Question: (TCO 1) Which statement about security policy creation is true? Your Answer: Question: (TCO 1) Which one of the following is NOT considered a Security Policy weakness? Your Answer: Question: (TCO 1) Snooping and packet sniffing are examples of a security threat called ___________. Your Answer: Question: (TCO 1) Snooping and packet sniffing are examples of a security threat called ___________. Your Answer: Question: (TCO 1) Snooping and packet sniffing are examples of a security threat called ___________. Your Answer: Question: (TCO 1) Which one of the following is not a motivation of threat Your Answer: Question: (TCO 1) The Smurf attack is an example of ___________ attack that floods a target system via spoofed broadcast ping Your Answer: Question: (TCO 1) Which of the following are well-know denial-of-service attacks Your Answer: Question: (TCO 1) Which of the follwoing form part of a risk assessment Your Answer: Question: TCO 1) The ________________ attack method attempts to overload the network with many incomplete TCP session requests. Your Answer: Question: (TCO 1) Which of the following is not an element of Security Architecture Your Answer: Question: (TCO 2) The enable password uses type _____ encryption (if you use service-password encryption) and is VERY easy to crack. It was replaced with the enable secret command which uses type ____ encryption and is hard to crack. Your Answer: Question: (TCO 2) When you both enable password and enable secret, the router ___________. Your Answer: Question: (TCO 2) Which One of the following prompts indicate that you have booted (normally) into the IOS stored in Flash memory ? Your Answer: Question: (TCO 3) Which one of the following Configuration Register settings will cause the router to Boot into a ROM-based IOS called Bootstrap (ROM Monitor) mode? Your Answer: Question: (TCO 2) ROM Monitor (or ROMMON), a firmware that executes when you power on the routers and helps to initialize the processor hardware and boot the operating system software, can be ______________....
View Full Document

This note was uploaded on 07/31/2011 for the course ACCT 550 taught by Professor Log during the Spring '11 term at Abu Dhabi University.

Page1 / 19

quizs questions - 1. Question: (TCO 1) In a masquerade...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online