What is a software that self-replicates?
Virus
Scanning using a rules-based approach is considered what type of scanning?
Heuristic
True or False a connect scan is the most reliable type of scan?
True
What should someone do first is they believe their password has been exposed online?
Change their password immediately.
What protects the actual packet data in IPsec?
ESP
Taking control of the communication link between two machines best describes what type of hacking action?
session hacking/hijacking
The most common method of virus propagation is through what?
Email attachments
Trying to identify the machines on a target network is called ______.
Enumerating
What is the most important characteristic all user policies must have in order to be effective?
They must have consequences.
PPTP is based on what earlier protocol?
PPP
Sending a packet that appears to come from a trusted IP address.
IP Spoofing
A database containing system settings describes what?
The Registry
The tool OphCrack does what?
Retrieves Windows passwords
What is the first step after discovering a machine or machines have been infected with a virus?
Quarantine infected machines
In a network is several workstations and servers, what devices would be best for managing logs from all devices?
SIEM
What DoS attack is based on leaving connections half open?
SYN Flood
What level of privileges should all users have?
Least Possible
When sending a SYN packet to an open port, what is the correct response?
SYN/ACK
Which security model (Clark-Wilson, Bell-LaPadula, Biba) prevents transactions from inadvertently altering secure data?
Clark-Wilson
IDS is an acronym for:
Intrusion-detection system
Block ICMP packets from outside of the network
What number of account lockout attempts does the NSA recommend?
3 Tries
You scan a target network to find port 445 open and active. What does this tell you?
The system uses Windows
What is a Chinese wall, in the context of business practices?
A barrier to information flow
A system that is set up for attracting and monitoring intruders is called what?
Honeypot