Review Questions

1. 

Which of the following can be used to monitor a network for unauthorized activity? (Choose two.)

  1. Network sniffer

  2. N-IDS

  3. H-IDS

  4. VPN

a and b. network sniffers and n-ids systems are used to monitornetwork traffic. network sniffers are manually oriented, while ann-ids can be automated.

2. 

Which system is installed on a host to provide IDS capabilities?

  1. Network sniffer

  2. N-IDS

  3. H-IDS

  4. VPN

c. a host-based ids (h-ids) is installed on each host that needs ids capabilities.

3. 

Which of the following is an active response in an IDS?

  1. Sending an alert to a console

  2. Shunning

  3. Reconfiguring a router to block an IP address

  4. Making an entry in the security audit file

c. dynamically changing the system's configuration to protect thenetwork or a system is an active response.

4. 

Which implementation of IDS detects intrusions based on previously established rules?

  1. MD-IDS

  2. AD-IDS

  3. H-IDS

  4. N-IDS

a. by comparing attack signatures and audit trails, a misuse-detectionids determines whether or not an attack is occurring.

5. 

Which function in an IDS evaluates data collected from sensors?

  1. Operator

  2. Manager

  3. Alert

  4. Analyzer

d. the analyzer function uses data sources from sensors to analyzeand determine whether an attack is underway.

6. 

Which role is responsible for reporting the results of an attack to a systems operator or administrator?

  1. Alert

  2. Manager

  3. Analyzer

  4. Data source

b. the manager is the component that the operator uses to manage theids. the manager may be a graphical interface, a real-time trafficscreen, or a command-line driven environment.

7. 

What is a system that is intended or designed to be broken into by an attacker called?

  1. Honey pot

  2. Honeybucket

  3. Decoy

  4. Spoofing system

a. a honey pot is a system that is intended to be sacrificed in the nameof knowledge. honey pot systems allow investigators to evaluateand analyze the attack strategies used. law enforcement agenciesuse honey pots to gather evidence for prosecution.

8. 

What is the process of formulating a response to a computer attack called?

  1. Incident response

  2. Evidence gathering

  3. Entrapment

  4. Enticement

a. incident response is the process of determining the best method ofdealing with a computer security incident.

9. 

Which of the following is not a part of an incident response?

  1. Identification

  2. Investigating

  3. Entrapment

  4. Repairing

c. entrapment is the process of encouraging an individual to performan unlawful act that they would not normally have done withoutencouragement.

10. 

The connection between wireless devices is accomplished using which protocol?

  1. WEP

  2. WTLS

  3. WAP

  4. WOP

c. wireless applications protocol (wap) is a protocol intendedfor use with wireless devices. wap is similar in function to tcp/ip.

11. 

Which protocol operates on 2.4GHz and has a bandwidth of 1Mbps or 2Mbps?

  1. 802.11

  2. 802.11a

  3. 802.11b

  4. 802.11g

a. 802.11 operates on 2.4ghz. this standard allows for bandwidthsof 1mb or 2mb.

12. 

Which protocol was designed to provide security to a wireless network that is equivalent to the security of a wired network?

  1. WAP

  2. WTLS

  3. WEP

  4. IR

c. wired equivalent privacy was intended to provide the equivalentsecurity of a wired network. however, wep has security vulnerabilitiesthat make this goal impossible.

13. 

Which of the following is a primary vulnerability of a wireless environment?

  1. Decryption software

  2. IP spoofing

  3. A gap in the WAP

  4. Site survey

d. a site survey is the process of monitoring a wireless network usinga computer, wireless controller, and analysis software. site surveys areeasily accomplished and hard to detect.

14. 

To which of the following is IM vulnerable?

  1. Malicious code

  2. IP spoofing

  3. Man in the middle attacks

  4. Replay attacks

a. im users are highly susceptible to malicious code attacks such asworms, viruses, and trojan horses. ensure that im users have up-to-dateantivirus software installed.

15. 

What is the process of identifying the configuration of your network called?

  1. Footprinting

  2. Scanning

  3. Jamming

  4. Enumeration

b. scanning is the process of gathering data about your networkconfiguration and determining which systems are live.

16. 

What is the process of identifying your network and its security posture called?

  1. Footprinting

  2. Scanning

  3. Jamming

  4. Enumeration

a. footprinting involves identifying your network and its securityposture. footprinting is done using multiple sources of information todetermine what systems you may be using.

17. 

What is the process of gaining access to your information (especially network resources such as user and group files) called?

  1. Footprinting

  2. Scanning

  3. Jamming

  4. Enumeration

d. enumeration occurs after scanning in a typical attack. the purposeis to gain access to resources for nefarious purposes.

18. 

What is the process of disrupting an IM session called?

  1. Jamming

  2. Broadcasting

  3. Incident response

  4. Site survey

a. jamming is the process of intentionally disrupting communicationsin an im session. jamming is a loosely defined term, and it refers to anyintentional disruption that is not a dos attack.

19. 

You have just received a call from an IM user in your office who visited an advertised website. The user is complaining that his system is unresponsive and about a million web browsers have opened on his screen. What type of attack has your user had?

  1. DoS

  2. Malicious code

  3. IP spoofing

  4. Site survey

a. your user has just encountered an application-level dos. this typeof attack is very common, is not usually fatal, but is very annoying.your user should restart his system, verify that the website did nottransmit a virus, and stay away from broadcasted websites.

20. 

Which term best describes an occurrence of suspicious activity in a network?

  1. Event

  2. Spoofing

  3. Jamming

  4. Enumeration

a. an ids will announce an event through an alert when suspiciousactivity is encountered.

Answers

1. 

A and B. Network sniffers and N-IDS systems are used to monitor network traffic. Network sniffers are manually oriented, while an N-IDS can be automated.

2. 

C. A Host-based IDS (H-IDS) is installed on each host that needs IDS capabilities.

3. 

C. Dynamically changing the system's configuration to protect the network or a system is an active response.

4. 

A. By comparing attack signatures and audit trails, a misuse-detection IDS determines whether or not an attack is occurring.

5. 

D. The analyzer function uses data sources from sensors to analyze and determine whether an attack is underway.

6. 

B. The manager is the component that the operator uses to manage the IDS. The manager may be a graphical interface, a real-time traffic screen, or a command-line driven environment.

7. 

A. A honey pot is a system that is intended to be sacrificed in the name of knowledge. Honey pot systems allow investigators to evaluate and analyze the attack strategies used. Law enforcement agencies use honey pots to gather evidence for prosecution.

8. 

A. Incident response is the process of determining the best method of dealing with a computer security incident.

9. 

C. Entrapment is the process of encouraging an individual to perform an unlawful act that they would not normally have done without encouragement.

10. 

C. Wireless Applications Protocol (WAP) is a protocol intended for use with wireless devices. WAP is similar in function to TCP/IP.

11. 

A. 802.11 operates on 2.4GHZ. This standard allows for bandwidths of 1MB or 2MB.

12. 

C. Wired Equivalent Privacy was intended to provide the equivalent security of a wired network. However, WEP has security vulnerabilities that make this goal impossible.

13. 

D. A site survey is the process of monitoring a wireless network using a computer, wireless controller, and analysis software. Site surveys are easily accomplished and hard to detect.

14. 

A. IM users are highly susceptible to malicious code attacks such as worms, viruses, and Trojan horses. Ensure that IM users have up-to-date antivirus software installed.

15. 

B. Scanning is the process of gathering data about your network configuration and determining which systems are live.

16. 

A. Footprinting involves identifying your network and its security posture. Footprinting is done using multiple sources of information to determine what systems you may be using.

17. 

D. Enumeration occurs after scanning in a typical attack. The purpose is to gain access to resources for nefarious purposes.

18. 

A. Jamming is the process of intentionally disrupting communications in an IM session. Jamming is a loosely defined term, and it refers to any intentional disruption that is not a DoS attack.

19. 

A. Your user has just encountered an application-level DoS. This type of attack is very common, is not usually fatal, but is very annoying. Your user should restart his system, verify that the website did not transmit a virus, and stay away from broadcasted websites.

20. 

A. An IDS will announce an event through an alert when suspicious activity is encountered.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net