You are the Systems Administrator for a large corporate organization. You need to monitor
all network traffic on your local network for suspicious activities and receive notifications
when an attack is occurring. Which tool would allow you to accomplish this goal?
A.
Host-based IDS
B.
Firewall
C.
Network-Based IDS
D.
Proxy
Network-Based IDS
You just set up a security system in your network. In what kind of system would you find
thefollowing string of characters used as a rule within its configuration?
alert tcp any any ->192.168.100.0/24 21 (msg: "FTP on the network!";)
A.
A firewall IPTable
B.
A Router IPTable
C.
An Intrusion Detection System
D.
FTP Server rule
An Intrusion Detection System
Jimmy is standing outside a secure entrance to a facility. He is pretending to having a
tense conversation on his cell phone as an authorized employee badges in. Jimmy, while
still on the phone, grabs the door as it beginsto close.
What just happened?
A.
Masquading
B.
Phishing
C.
Whaling
D.
Piggybacking
Piggybacking
To determine if a software program properly handles a wide range of invalid input, a form of
automated testing can be used randomly generate invalid input in an attempt to crash the
program.
What term is commonly used when referring to this type of testing?
A.
Bounding
B.
Mutating
C.
Puzzing
D.
Randomizing
Puzzing
During a blackbox pen test you attempt to pass IRC traffic over post 80/TCP from a
compromised web enabled host. The traffic gets blocked; however outbound HTTP traffic is
unimpeded.
What type of firewall is inspecting outbound traffic?
A.
Circuit
B.
Packet Filtering
C.
Application
D.
Stateful
Application
Page 7 out of 25 Pages |
Previous |