Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (39)
Securing web applications is easier than protecting other systems.
If a MAC address is permanently burned into a network interface card, how can an attacker change the MAC address to perform an Arp poisoning attack?
It can be changed in the Arp cache which is a form of ARP poisoning.
The return address is the only element that can be altered in a buffer overflow attack?
False, The return address is not the only element that can be altered in a buffer overflow but the most common.
What criteria must be met for XXS attack to occur on a specific website.
The website must accept user input without validating it and use it as a response.
What protocol can be used by a host on a network to find the mac address of a device based on an IP address?
How does an XSS attack work?
In the simplest form, XSS attacks occur when user-supplied input is reflected in the HTML of a web page. Due to poor separation between code context and user data, the user input is executed as code.
What technology expands the normal capabilities of a web browser for a specific webpage?
When an attack is designed to prevent authorized users from accessing a system, it is called what kind of attack?
denial of service
If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain web traffic to generate income, what type of attack are they using?
Which layer of the OSI model contains the TCP protocol, which is used for establishing connections and reliable data transport between devices?
What type of computing environment allow servers, storage, and the supporting networking infrastructure to be shared by multiple enterprises
Which device operates at the network layer (layer 3) of the OSI model and packets across a computer network?
What protocol suite below is the most commonly used protocol for LAN communication?
In what type of cloud computing does the customer have some control over the operating systems, storage, and their installed applications?
IaaS(infrastructure as a service)
In a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?
Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?
At what level of the OSI model does the IP protocol function?
An administrator needs to examine FTP commands that are being passed to the server
Type I hypervisors run on the host operating system
False, Type I hypervisor runs directly on the machines hardware.
What is the name of the computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
Forward proxy server
Difference between subnetting and VLANs
Subnet are subdivisions of IP address classes and allow a single Class A, B, C network to be used instead of multiple networks. VLANs devices that are connected to or by their media access control access.
Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?
reverse proxy server
What technology enables authorized users to use an unsecured public network, such as the internet as if it were a private network?
What network address below is not a private IP address network?
126.96.36.199, Class B private IP ranges are 172.16.0.0 to 172.31.255.255
How does a UTM security product help reduce administrator overhead?
It simplifies managing by granting network administrators use of an integrated interface.
Discuss two advantages that NAT provides?
Private IP can be used on a public network and IP spaces can be saved.
What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS?
What technology will examine the current state of a network device before allowing it to connect to the network and force any device that does not meet a specific set of criteria to connect only to a quarantine?
NAC(network access control)
What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?
POP and IMAP
Slave devices that are connected to a piconet and are sending transmissions are known as what?
Discuss how to prevent bluesnarfing?
turning off bluetooth, turn off discovery mode, and require approval for connection.
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
Rogue access point
What is the maximum range of most Bluetooth 5 devices
What type of radio frequency transmissions are used by Bluetooth device?
Describe a piconet
Ad hoc network that links a group of bluetooth device
What is the message Intergrity check(MIC) within WPA used for?
To check integrity of packets
The MAC address is a unique 64-bit number that is burned into the network interface card adapter when it is manufactured?
False, MAC address is a unique 48-bit number
What are the four type of packets used by EAP?
Request, respond, success, and failure.
Which encryption protocol below is used in the WPA2 standard?
Students also viewed
Smiley Face Tricks
bio chapter 6
bio chapter 1
When trying to convince a friend not to drive after drinking, you should try: A. Talking to your friend in private so he or she won’t get embarrassed B. Finding a reason for him or her to stay at the party C. Both A and B D. Neither A nor B
What is the term used to describe all of the milk components exclusive of water and milk fat?
Which religion has the most followers worldwide?
why do you think young people turn to music to express their differences from their parents' generation?
Other Quizlet sets
Torts Final Part 1
Business Law-Unit 6 Self Checks
Exam 2 Tophat Questions
IPAP Pathology Block 2 COMPLETE