Answer a see chapter 10 network services such as

Info iconThis preview shows pages 6–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Answer: A See Chapter 10. Network services such as Telnet and FTP are disabled on a system that's in single-user mode. 173 Fraud is a term used to describe A. Stealing information to sell to a competitor or other person
Background image of page 6

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
B. Activities such as Denial of Service, social engineering, or eavesdropping C. Siphoning money out of an organization via phony transactions D. Any activity that takes advantage of weaknesses and results in personal gain Answer: D See Chapter 10. Fraud is an activity that's perpetrated in order to exact personal gain. 174 Denial of Service is A. The result when an administrator disables unnecessary network services B. An attack that prevents legitimate users from being able to use a resource C. What happens when a user lacks sufficient security credentials D. What happens when an intruder sends high volumes of network traffic to a system Answer: B See Chapter 10. Denial of Service (DOS) is an attack that’s intended to disable a server or network so that it can’t service legitimate customers. 175 The purpose of intrusion detection is A. To detect attacks and other anomalies B. To make sure that people aren’t trying to tailgate through security entrances C. To verify that the honeypot or honeynet is working correctly D. To catch hacking attempts that the firewall misses Answer: A See Chapter 10. Intrusion detection is used to detect intrusions, attacks, and other anomalies. 176 The main disadvantage of signature-based intrusion detection is A. It’s considerably more expensive than linguistic intrusion detection. B. Some hackers are good at forging other people’s signatures. C. Signatures must be constantly kept up-to-date. D. Handwriting tablets are still very expensive. Answer: C
Background image of page 7
See Chapter 10. Like antivirus software, signature-based intrusion detection systems must be frequently updated. 177 War driving is the term used to describe A. Looking for vulnerable client systems in order to build a list of DDOS zombies B. Sniffing wireless networks to look for vulnerabilities C. Running multiple concurrent port scanning tools on a system D. Running DOOM™ on a gigabit Ethernet Answer: B See Chapter 10. War driving is similar to war dialing, in which an individual who has a laptop computer, wireless LAN adaptor, and special software can literally drive around looking for vulnerable wireless LANs. 178 Violation processing is used to A. Quantify security risks. B. Attempt to bypass intrusion detection systems. C. Discover hard-to-guess passwords. D. Detect individuals who are generating a high volume of errors. Answer: D See Chapter 10. Violation processing is used to identify high levels of anomalous activity, such as the number of unsuccessful login attempts, in order to point out possible security problems and their causes. 179
Background image of page 8

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page6 / 13

Answer A See Chapter 10 Network services such as Telnet and...

This preview shows document pages 6 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online