Details of this Paper

sec370 quiz




1. (TCO 1) According to the video in Week 1, what are the typical steps used to compromise an organization? Enumeration, footprinting,... (Points: 5) Cain and Abel, and Metasploit.;keyloggers, and external attackers.;attack, and scanning.;network connection points, and phishing.;Question 2. 2. (TCO 1) Someone who reports found vulnerabilities to vendors is also known as what? (Points: 5) Ethical hacker;White hat hacker;Cracker;Phreaker;Question 3. 3. (TCO 1) Which is the correct malware propagation method combination? (Points: 5) Trojan: Copies itself to shares and vulnerable services;Trojan: Pretends to be a useful program;Virus/Worm: Pretends to be a useful program;Virus/Worm: Encrypts the hard drive and demands payment to decrypt;Question 4. 4. (TCO 3) What is the proper connection chain for an application gateway? (Points: 5) Destination service - Client - Gateway;Client - Gateway - Destination service;Gateway - Client - Destination Service;Gateway - Destination Service - Client;Question 5. 5. (TCO 2) Two techniques that should be part of every network design include (Points: 5) DMZs and proxy servers.;packet filter and bastion host.;Norton personal firewall and Outpost personal firewall.;IP spoofing and SYN floods.;Question 6. 6. (TCO 3) Which firewall solution would be best for a business without a full-time security person, running Windows XP Professional and Linux operating systems, using the Internet, and requiring remote access to their intranet server for field sales people? (Points: 5) PC firewall software on every machine;Linux based firewall software that also functions as the company web server;A medium-sized business firewall with NAT and VPN;An enterprise firewall with NAT VPN IPSEC FTP and PKI;Question 7. 7. (TCO 7) Configuring your firewall to not allow ICMP packets from outside the network is an example of defending against what type of attack? (Points: 5) Denial of service;Buffer overflow;Session hacking;IP spoofing;Question 8. 8. (TCO 3) What firewall type/methodology or system would you recommend for a small, 10-user IT shop running Windows systems exclusively, looking for basic protection from Internet threats? (Points: 15)


Paper#70612 | Written in 18-Jul-2015

Price : $22