1.
Identify three techniques used in social engineering. (Choose three.)
Correct Answer(s)
B. Vishing
C. pHishing
E. Pretexting
Explanation
Vishing, phishing, and pretexting are three techniques commonly used in social engineering. Vishing refers to the act of using voice communication, such as phone calls, to deceive individuals and gather sensitive information. Phishing involves sending fraudulent emails or messages to trick recipients into revealing personal data or login credentials. Pretexting involves creating a false scenario or pretext to manipulate individuals into providing confidential information. These techniques exploit human vulnerabilities and trust to gain unauthorized access or manipulate individuals for malicious purposes.
2.
During a pretexting event, how is a target typically contacted?
Correct Answer
B. By pHone
Explanation
During a pretexting event, a target is typically contacted by phone. This method allows the attacker to establish a more personal and convincing interaction, as they can use voice manipulation techniques and social engineering tactics to gain the target's trust and obtain sensitive information. Email or other forms of communication may lack the same level of immediacy and personal touch that a phone call provides, making it a less effective choice for pretexting.
3.
While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
Correct Answer
C. Trojan horse
Explanation
A Trojan horse attack occurred in this scenario. A Trojan horse is a type of malicious software that disguises itself as a legitimate program or file, tricking users into installing it. In this case, the user unknowingly opened a box claiming a prize, which installed a program on their computer. This program allowed an intruder to gain access to the computer and retrieve personal information. Unlike viruses or worms, Trojan horses do not replicate themselves, but instead rely on user interaction to be installed.
4.
What is a major characteristic of a Worm?
Correct Answer
D. Exploits vulnerabilities with the intent of propagating itself across a network
Explanation
A major characteristic of a worm is that it exploits vulnerabilities with the intent of propagating itself across a network. Unlike viruses, worms do not require a host program to attach themselves to and can spread independently. They take advantage of security weaknesses in computer systems to rapidly replicate and spread from one device to another. This characteristic makes worms a significant threat to network security as they can quickly infect multiple devices and cause widespread damage.
5.
A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
Correct Answer
D. SYN flooding
Explanation
SYN flooding is the type of attack that occurred. In a SYN flood attack, the attacker sends a flood of TCP SYN packets with invalid source-IP addresses to the server, requesting a connection. The server then tries to respond to all these requests, keeping its resources busy and resulting in valid requests being ignored. This type of attack can lead to denial of service as the server becomes overwhelmed with the flood of requests.
6.
What type of advertising is typically annoying and associated with a specific website that is being visited?
Correct Answer
B. Popups
Explanation
Popups are a type of advertising that is typically annoying and associated with a specific website that is being visited. These are small windows that appear on top of the website content, usually displaying advertisements or promotional messages. Popups interrupt the user's browsing experience and can be perceived as intrusive and disruptive. They often require the user to close them manually before continuing with their intended actions on the website.
7.
What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
Correct Answer
B. Spam
Explanation
Spam is a widely distributed approach to marketing on the Internet that involves sending unsolicited messages to as many individual users as possible via IM or email. It is considered a form of mass advertising that aims to reach a large audience, often with the intention of promoting products or services. Spam is often seen as intrusive and unwanted by recipients, and it is commonly associated with unsolicited emails that can clog up inboxes and be a nuisance to users.
8.
What part of the security policy states what applications and usages are permitted or denied?
Correct Answer
C. Acceptable use
Explanation
The correct answer is "acceptable use." The acceptable use policy is a part of the security policy that outlines what applications and usages are allowed or prohibited within an organization. It sets guidelines for employees regarding the proper and acceptable use of company resources, such as computers, networks, and internet access. This policy helps to ensure that employees understand their responsibilities and the boundaries of acceptable behavior, ultimately promoting a secure and productive work environment.
9.
Which statement is true regarding anti-virus software?
Correct Answer
C. Only after a virus is known can an anti-virus update be created for it.
Explanation
Anti-virus software is designed to detect and remove viruses from computer systems. In order to create an update for a specific virus, the virus must first be identified and analyzed by security experts. Once the virus is known, the anti-virus software developers can create an update that includes the necessary information to detect and remove that specific virus. This update can then be distributed to users, allowing them to protect their systems from the newly identified virus. Therefore, the statement "Only after a virus is known can an anti-virus update be created for it" is true.
10.
Which two statements are true concerning anti-spam software? (Choose two.)
Correct Answer(s)
B. When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
D. Even with anti-spam software installed, users should be careful when opening e-mail attachments.
Explanation
Anti-spam software can sometimes incorrectly classify legitimate emails as spam, which can result in important messages being missed. Therefore, it is true that when anti-spam software is loaded, legitimate emails may be classified as spam by mistake. Additionally, even with anti-spam software installed, users should still exercise caution when opening email attachments, as the software may not catch all malicious files.
11.
What term is used to describe a dedicated hardware device that provides firewall services?
Correct Answer
D. Appliance-based
Explanation
An appliance-based firewall refers to a dedicated hardware device that is specifically designed to provide firewall services. Unlike server-based or integrated firewalls, which are software-based solutions, appliance-based firewalls are standalone devices that offer robust security features and are often more efficient in handling high network traffic. They are commonly used in network environments where a high level of security is required, offering advanced protection against unauthorized access and malicious activities.
12.
Which acronym refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
Correct Answer
B. DMZ
Explanation
A DMZ (Demilitarized Zone) is a network segment that acts as a buffer zone between the internal network and the external network. It is accessible by both internal and external host devices, making it a suitable answer for this question. The other options, SPI (Stateful Packet Inspection), ISR (Integrated Services Router), and ISP (Internet Service Provider), do not specifically refer to an area of the network that is accessible by both internal and external devices.
13.
Which statement is true about port forwarding within a Linksys integrated router?
Correct Answer
A. Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
Explanation
Port forwarding within a Linksys integrated router allows only external traffic that is intended for specific internal ports to pass through. All other traffic is blocked or denied. This means that the router only allows incoming connections to specific ports on the internal network, while blocking all other incoming traffic. This is a common security measure to protect the internal network from unauthorized access and potential threats.
14.
To which part of the network does the wireless access point part of a Linksys integrated router connect?
Correct Answer
C. Internal
Explanation
The wireless access point part of a Linksys integrated router connects to the internal part of the network. This means that it is responsible for providing wireless connectivity to devices within the network, allowing them to access resources and communicate with each other. The internal network is typically the private network within a home or office, where devices such as computers, smartphones, and printers are connected. By connecting to the internal network, the wireless access point ensures that these devices can access the internet and other network resources wirelessly.
15.
Refer to the graphic. What is the purpose of the Internet Filter option of Filter IDENT (Port 113. on the Linksys integrated router?
Correct Answer
B. To prevent outside intruders from attacking the router through the Internet
Explanation
The purpose of the Internet Filter option of Filter IDENT (Port 113) on the Linksys integrated router is to prevent outside intruders from attacking the router through the Internet. This option filters out any incoming traffic on Port 113, which is commonly used for the IDENT protocol. By blocking access to this port, the router is protected from potential attacks and unauthorized access attempts from external sources.
16.
What statement is true about security configuration on a Linksys integrated router?
Correct Answer
D. Internet access can be denied for specific days and times.
Explanation
The correct answer is "Internet access can be denied for specific days and times." This means that the security configuration on a Linksys integrated router allows the user to restrict or block internet access during certain days and times. This feature can be useful for controlling internet usage and ensuring that access is only available during specific periods. It is important for users to be able to have control over when internet access is allowed or denied for security and management purposes.
17.
What environment would be best suited for a two-firewall network design?
Correct Answer
A. A large corporate environment
Explanation
A large corporate environment would be best suited for a two-firewall network design because it provides enhanced security and protection for the organization's sensitive data and resources. With a large number of users and devices, there is a higher risk of unauthorized access and attacks. Implementing two firewalls can create an additional layer of defense by segregating the network into different security zones and enforcing stricter access control policies. This design ensures that even if one firewall is compromised, the second firewall can still provide protection and prevent unauthorized access to critical assets.
18.
What is one function that is provided by a vulnerability analysis tool?
Correct Answer
B. It identifies missing security updates on a computer.
Explanation
A vulnerability analysis tool is designed to identify vulnerabilities and weaknesses in a system or network. One of the functions provided by such a tool is to identify missing security updates on a computer. This is important because outdated software or missing patches can create security vulnerabilities that can be exploited by attackers. By identifying these missing updates, the tool helps ensure that the system is up to date with the latest security patches, reducing the risk of potential attacks.
19.
Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
Correct Answer
E. Disable the wireless network when a vulnerability analysis is being performed.
Explanation
Disabling the wireless network when a vulnerability analysis is being performed is not a best practice for wired and wireless security. Vulnerability analysis is typically conducted to identify potential weaknesses in the network, and disabling the wireless network during this process would prevent the analysis from accurately assessing the security of the wireless network. It is important to keep the wireless network active during vulnerability analysis to identify any vulnerabilities and take appropriate measures to mitigate them.
20.
What best practice relates to wireless access point security?
Correct Answer
B. A change of the default IP address
Explanation
A best practice for wireless access point security is to change the default IP address. This is important because many access points come with a default IP address, which is known to hackers and can make the network vulnerable to attacks. By changing the default IP address, it becomes harder for unauthorized users to gain access to the network. This is a simple but effective measure to enhance the security of the wireless access point.
21.
Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
Correct Answer
C. It requires that packets coming into the router be responses to internal host requests.
Explanation
The SPI Firewall Protection option Enabled in the Linksys Security menu requires that packets coming into the router be responses to internal host requests. This means that the firewall will only allow incoming packets that are in response to a request made by a device within the internal network. It helps to prevent unauthorized access and ensures that only legitimate responses are allowed through the firewall.