NWSec_FW_VPN


50 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
What can you detect by analyzing a data packet?
Policy violations and network vulnerabilities N/A
Which of the following is true about Net Witness investigator?
Analyzes static and real-time data. N/A
What is used by TCP to establish a session between two systems?
Three-way Handshake Ch. 2, 69 Ch 4, 121
Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?
TCP
Ch. 2, 65,69
Promiscuous mode is most commonly associated with which of the following?
A network interface. N/A
Which of the following is NOT a primary objective of information security?
Privacy Ch. 1, 6
Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of which of the following?
Policy Ch 1, 9
Which security group is responsible for managing network vulnerabilities and threats?
IIT security staff Ch. 1,12
Which network component filters traffic between nodes?
Firewall Ch2, 44
Which is the most important consideration when designing a network?
Ability to meet business needs. Ch1, 10
What is usually the first activity in the hacking process?
Reconnaissance Ch4,119
Which of the following might a hacker offer as a service?
DoS attack, spam distribution and password cracking. Ch4, 113
Which of the following IT domains is most vulnerable to social engineering?
User Ch4, 115
What type of attack can result in arbitrary code execution with system-level privileges?
Buffer Overflow? Ch4, 134
Which of the following is a social engineering technique?
IImpersonation, Reciprocity and Phishing. (All of these). Ch4, 129, 144, 145