Details of this Paper

sec370 quiz

Description

solution


Question

1. (TCO 1) According to the video in Week 1, what are the typical steps used to compromise an organization? Enumeration, footprinting,... (Points: 5) Cain and Abel, and Metasploit.;keyloggers, and external attackers.;attack, and scanning.;network connection points, and phishing.;Question 2. 2. (TCO 1) Someone who reports found vulnerabilities to vendors is also known as what? (Points: 5) Ethical hacker;White hat hacker;Cracker;Phreaker;Question 3. 3. (TCO 1) Which is the correct malware propagation method combination? (Points: 5) Trojan: Copies itself to shares and vulnerable services;Trojan: Pretends to be a useful program;Virus/Worm: Pretends to be a useful program;Virus/Worm: Encrypts the hard drive and demands payment to decrypt;Question 4. 4. (TCO 3) What is the proper connection chain for an application gateway? (Points: 5) Destination service - Client - Gateway;Client - Gateway - Destination service;Gateway - Client - Destination Service;Gateway - Destination Service - Client;Question 5. 5. (TCO 2) Two techniques that should be part of every network design include (Points: 5) DMZs and proxy servers.;packet filter and bastion host.;Norton personal firewall and Outpost personal firewall.;IP spoofing and SYN floods.;Question 6. 6. (TCO 3) Which firewall solution would be best for a business without a full-time security person, running Windows XP Professional and Linux operating systems, using the Internet, and requiring remote access to their intranet server for field sales people? (Points: 5) PC firewall software on every machine;Linux based firewall software that also functions as the company web server;A medium-sized business firewall with NAT and VPN;An enterprise firewall with NAT VPN IPSEC FTP and PKI;Question 7. 7. (TCO 7) Configuring your firewall to not allow ICMP packets from outside the network is an example of defending against what type of attack? (Points: 5) Denial of service;Buffer overflow;Session hacking;IP spoofing;Question 8. 8. (TCO 3) What firewall type/methodology or system would you recommend for a small, 10-user IT shop running Windows systems exclusively, looking for basic protection from Internet threats? (Points: 15)

 

Paper#70612 | Written in 18-Jul-2015

Price : $22
SiteLock