1: | Which of the following are sources from which an attacker can determine information about a target network?- DNS
- ARIN/RIPC/APNIC records
- whois information
- Phone book
- All of the above
|
2: | What does "network posture visibility reduction" mean?- Lower the number of all the servers in the network
- Reduce the number of users that can access the network
- Eliminate essential services from servers in the public-facing segment to a minimum
- Reduce the number of services in the public-facing segment of the network to a minimum
- None of the above
|
3: | Which of the following actions should be taken to harden applications and thereby make it more difficult for an attacker to perform reconnaissance on a network?- Remove application banners from application greetings
- Apply patches to all applications
- Turn off unnecessary services
- Apply access control lists to edge routers
- Turn off essential services
|
4: | What is the purpose of RFC 2827?- It defines a range of network addresses to be used for private networks.
- It describes a method of mitigating DoS attacks.
- It describes the behavior of the TCP protocol.
- It defines site security procedures.
- It defines the behavior of the IP protocol.
|
5: | Which feature of Cisco routers is considered an "anti-DoS" feature?- NetFlow
- Fast switching
- Stateful firewall
- TCP intercept
- None of the above
|
6: | Which of the following methods can you utilize to mitigate the effects of DoS attacks?- NetFlow
- Traffic-rate limiting
- Fast switching
- Quality of service
- Stateful firewall
|
7: | Which of the following is classified as an unauthorized access attack?- An attacker connects to a web server and downloads publicly available files
- An attacker connects to an anonymous FTP server and downloads publicly available files
- An attacker connects to the SMTP port of a mail server and forges e-mail
- An attacker queries DNS for information about hosts on the network
- An attacker connects to the Telnet port of a system and repeatedly tries various username/password combinations until he gains entry to the system
|
8: | What makes application layer attacks possible?- Vulnerabilities in applications
- Poor access control lists
- Lack of proper firewall configuration
- Poor password choices
- None of the above
|
9: | How can network and system administration personnel reduce the risk of an application layer attack?- They can't; application layer attacks are inevitable
- Follow system administration best common practices
- Turn off applications
- Block application ports at the firewall
- All of the above
|
10: | If an attacker is able to gain access to an internal server through a DMZ web server, what is the possible cause?- The DMZ web server was not configured properly.
- The DMZ web server was vulnerable to exploitation.
- The edge router access control list was not blocking port 80.
- The firewall access control lists allowed for the DMZ web server to connect to the internal server.
- The internal server root password was weak.
|