Chapter 7 Review Questions

Chapter 7 Review Questions - Chapter 7 Review Questions...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 7 Review Questions Review of attempt 1 Started on Wednesday, July 6, 2011, 07:44 PM Completed on Friday, July 8, 2011, 07:12 AM Time taken 1 day 11 hours Grade 86 out of a maximum of 100 ( 86 %) Question 1 Marks: 2 A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes. Answer: Correct Marks for this submission: 2/2. Question 2 Marks: 2 Activities that scan network locales for active systems and then identify the network services offered by the host systems is known as ____. Choose one answer. a. filtering b. doorknob rattling c. footprinting
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
d. fingerprinting Correct Marks for this submission: 2/2. Question 3 Marks: 2 A(n) ____ is a proposed systems user. Choose one answer. a. authenticator b. challenger c. supplicant d. activator Incorrect Marks for this submission: 0/2. Question 4 Marks: 2 A(n) listener vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software. Answer: True False Correct Marks for this submission: 2/2. Question 5 Marks: 2 ____ applications use a combination of techniques to detect an intrusion and then trace it back to its source. Choose one answer. a. Trace and treat
Background image of page 2
b. Trap and trace c. Treat and trap d. Trace and clip Correct Marks for this submission: 2/2. Question 6 Marks: 2 ____ are decoy systems designed to lure potential attackers away from critical systems. Choose one answer. a. Honeypots b. Honeycells c. Padded cells d. Padded nets Correct Marks for this submission: 2/2. Question 7 Marks: 2 A(n) ____________________ system contains pseudo-services that emulate well-known services, but is configured in ways that make it look vulnerable to attacks. Answer: Incorrect Correct answer: honeypot Marks for this submission: 0/2. Question 8 Marks: 2 Intrusion ____ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Choose one answer. a. prevention b. reaction c. detection d. correction Incorrect Marks for this submission: 0/2. Question 9 Marks: 2 Enticement is the action of luring an individual into committing a crime to get a conviction. Answer: True False Correct Marks for this submission: 2/2. Question 10 Marks: 2 A passive response is a definitive action automatically initiated when certain types of alerts are triggered.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 16

Chapter 7 Review Questions - Chapter 7 Review Questions...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online