Which of the following is the best countermeasure against man-in-the-middle attacks?
  • Anti-virus software.
  • Smurf.
  • IPSec.
  • It infects the MBR of a hard drive.
Your company security policy states that wireless networks are not to be used because of the potential security risks they present to your network.One day you find that an employee has connected to a wireless access point to the network in his office.What type of security risk is this?
  • Rogue Access Point.
  • Denial of Service.
  • Man-in-the-middle attack.
  • Anti-virus software.
How can an organization help prevent social engineering attacks?
  • Padded cell.
  • Denial of Service attack.
  • Install a network virus detection software solution.
  • Educate employees on the risks and countermeasures.Publish and enforce clearly-written security policies.
Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which security concern?
  • Anti-virus software.
  • Man-in-the-middle attack.
  • Denial of Service.
  • Virus.
Which of the following are examples of social engineering?
  • It infects the MBR of a hard drive.
  • A false server intercepts communications from a client by impersonating the intended server.
  • Anti-virus software.
  • Dumpster diving.Shoulder surfing.
Which of the following statements about the use of anti-virus software is correct?
  • It infects the MBR of a hard drive.
  • Anti-virus software.
  • A false server intercepts communications from a client by impersonating the intended server.
  • Anti-virus software should be configured to download updated virus definitions as soon as they become available.
You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted.You discover that a user downloaded a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur. What should you do?
  • Denial of Service attack.
  • Install a network virus detection software solution.
  • Educate employees on the risks and countermeasures.Publish and enforce clearly-written security policies.
  • Padded cell.
What is the primary countermeasure for social engineering?
  • Awareness.
  • A worm can replicate itself and does not need a host for distribution.
  • Virus.
  • IPSec.
Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?
  • Virus.
  • IPSec.
  • Anti-virus software.
  • Smurf.
Which of the following describes a man-in-the-middle attack?
  • A false server intercepts communications from a client by impersonating the intended server.
  • Anti-virus software should be configured to download updated virus definitions as soon as they become available.
  • It infects the MBR of a hard drive.
  • Dumpster diving.Shoulder surfing.
Users on your network report that they have received an e-mail stating that the company has just launched a new Website for employees, and to access the Website they need to go there and enter their username and password information. No one in your company has sent this email.What type of attack is this?
  • Phising.
  • Smurf.
  • Virus.
  • IPSec.
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?
  • Smurf.
  • IPSec.
  • Awareness.
  • Virus.
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?
  • Anti-virus software.
  • Man-in-the-middle attack.
  • Denial of Service.
  • Virus.
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0