Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

NETSEC 4 EXAM QUESTIONS AND CORRECT ANSWERS 100% VERIFIED!!, Exams of Advanced Education

NETSEC 4 EXAM QUESTIONS AND CORRECT ANSWERS 100% VERIFIED!!

Typology: Exams

2024/2025

Available from 07/13/2025

lyudmila-hanae
lyudmila-hanae 🇺🇸

1

(2)

8K documents

1 / 85

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
NETSEC 4 EXAM QUESTIONS AND CORRECT ANSWERS
100% VERIFIED!!
1) Ensuring network ________ means that authorized users have access to information,
services, and network resources.
A) confidentiality
B) integrity
C) availability
D) authentication
Answer - ANSWER C
2) In regards to network security, ________ means preventing unauthorized users from
gaining information about the network structure, data flowing across the network,
network protocols used, or packet header values.
A) confidentiality
B) integrity
C) availability
D) authentication
Answer - ANSWER A
3) Ensuring appropriate network ________ means preventing attackers from altering the
capabilities or operation of the network.
A) confidentiality
B) integrity
C) availability
D) functionality
Answer - ANSWER D
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55

Partial preview of the text

Download NETSEC 4 EXAM QUESTIONS AND CORRECT ANSWERS 100% VERIFIED!! and more Exams Advanced Education in PDF only on Docsity!

NETSEC 4 EXAM QUESTIONS AND CORRECT ANSWERS

1 00% VERIFIED!!

  1. Ensuring network ________ means that authorized users have access to information, services, and network resources. A) confidentiality B) integrity C) availability D) authentication Answer - ANSWER C

  2. In regards to network security, ________ means preventing unauthorized users from gaining information about the network structure, data flowing across the network, network protocols used, or packet header values. A) confidentiality B) integrity C) availability D) authentication Answer - ANSWER A

  3. Ensuring appropriate network ________ means preventing attackers from altering the capabilities or operation of the network. A) confidentiality B) integrity C) availability D) functionality Answer - ANSWER D

  1. In regards to network security, ________ is the policy-driven control of access to systems, data, and dialogues. A) confidentiality B) integrity C) access control D) availability Answer - ANSWER C

  2. "Death of the perimeter" is a phrase used by network administrators to convey that creating a 100% secure network is impossible. Answer - ANSWER TRUE

  1. An indirect attack occurs when an attacker tries to flood a victim with a stream of packets directly from the attacker's computer. Answer - ANSWER FALSE

  2. Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address. Answer - ANSWER TRUE

  1. ________ is the process of obscuring an attackers source IP address. A) Backscatter B) Spoofing C) IP Flood D) None of the above Answer: - ANSWER B

  2. A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections. A) SYN flood B) Ping flood C) HTTP flood D) None of the above Answer - ANSWER A

  3. A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic. A) SYN flood B) Ping flood C) HTTP flood D) None of the above Answer - ANSWER B

  4. A ________ attack is when a webserver is flooded with application layer web requests. A) SYN flood

  1. ________ are compromised hosts running malware controlled by the hacker. A) DDoS B) ICMP C) Bots D) None of the above Answer: - ANSWER C

  2. An attacker controlling bots in a coordinated attack against a victim is known as a ________. A) DoS attack B) DDoS attack C) ICMP D) None of the above. Answer - ANSWER B

  3. Once established, botnets can be leased to other criminals for DoS attacks. Answer - ANSWER TRUE

  4. ________ are an additional layer of compromised hosts that are used to manage large groups of bots. A) Botnets B) Handlers C) Phatbots D) None of the above Answer - ANSWER B

  1. In a P2P attack, there is a change in the overall volume of traffic but the traffic pattern is the same. Answer - ANSWER FALSE

  2. In a P2P attack, there is a change in traffic pattern but the overall volume of traffic is the same. Answer - ANSWER TRUE

  3. Listing your friend's home in the local classifieds at a low price is equivalent to a ________. A) P2P redirect B) P2P port C) DDoS D) None of the above Answer - ANSWER A

  4. In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The servers then send all responses to the victim. Answer - ANSWER TRUE

  5. In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host. Answer - ANSWER FALSE

  6. In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts. Answer - ANSWER FALSE

  7. A ________ is an older attack that uses an illegally large IP packet to crash an operating system.

  1. ARP is used to resolve 48-bit IP addresses into 32-bit local MAC addresses. Answer - ANSWER FALSE

  2. ARP is used to resolve 32-bit IP addresses into 48-bit local MAC addresses. Answer - ANSWER TRUE

  3. Rerouting traffic using ARP poisoning is an attack on ________ of a network. A) functionality B) confidentiality C) Both A and B D) None of the above Answer - ANSWER C

  4. One problem with ARP requests and replies is that they do not require authentication of verification. Answer - ANSWER TRUE

  5. In normal ARP traffic, generally an attacker on the same network cannot see traffic between two hosts. Answer - ANSWER TRUE

  6. In normal ARP traffic, every host can make ARP requests. Answer - ANSWER TRUE

  7. In a MITM attack, access to the local network is not required in order to work. Answer - ANSWER FALSE

  1. ________ is/are effective method(s) to preventing ARP poisoning attacks. A) Static tables B) Limiting local access C) Both A and B D) Neither A nor B Answer - ANSWER C

  2. Traditionally, Ethernet LANs offered no access security. Answer - ANSWER TRUE

  3. Access control is more of a problem for wired LANs than for wireless LANs. Answer - ANSWER FALSE

  4. Eavesdropping usually is more of a concern for ________ LANs than for ________ LANs. A) wired, wireless B) wireless, wired C) about an equal concern for wired and wireless LANs D) None of the above Answer - ANSWER B

  5. ________ is called Port-Based Access Control. A) 802.11i B) 802.1X C) Both A and B D) Neither A nor B Answer - ANSWER B

A) a request for a different authentication mechanism B) a negative acknowledgement C) Both A and B D) Neither A nor B Answer - ANSWER B

  1. An EAP message begins with an ________ message. A) EAP request B) EAP accept C) EAP start D) EAP response Answer - ANSWER C

  2. An EAP failure message is sent to the ________. A) authentication server B) authenticator C) client D) Any of the above Answer - ANSWER B

  3. When a new EAP authentication is added, software does not have to be changed on the ________. A) client B) authenticator C) central authentication server D) No software has to be changed on ANY device Answer - ANSWER B

  1. When a new EAP authentication is added, software has to be changed on the ________. A) authenticator B) central authentication server C) Both A and B D) Neither A nor B Answer - ANSWER B

  2. Most central authentication servers are governed by the ________ standard. A) EAP B) RADIUS C) IPsec D) 802.1X Answer - ANSWER B

  3. ________ is used by ________ for authentication. A) EAP, RADUS B) RADIUS, EAP C) Both A and B D) Neither A nor B Answer - ANSWER A

  4. EAP uses RADIUS for authentication. Answer - ANSWER FALSE

  5. The 802.1X protocol created for wired LANs can work in wireless LANs without significant modification.

B) wireless DOS attacks C) unauthorized network access D) None of the above Answer - ANSWER C

  1. Secure wireless networks can be legally accessed by anyone and are frequently posted as such. Answer - ANSWER FALSE

  2. Open networks can be legally accessed by anyone and are frequently posted as such. Answer - ANSWER FALSE

  3. Rogue access points are authorized access points set up by individuals or departments. Answer - ANSWER FALSE

  4. Rogue access points are unauthorized access points set up by individuals or departments. Answer - ANSWER TRUE

  5. By giving unauthorized users access to a local WLAN means that they are on the local network. Answer - ANSWER TRUE

  6. After gaining wireless access to the private network, the attach can ________. A) cause harm to internal clients B) steal data C) launch external attacks

D) All of the above Answer - ANSWER D

  1. A ________ can be used to gather network information or user data. A) RFMON B) packet sniffer C) whaling device D) None of the above Answer - ANSWER B

  2. Focusing electronic attacks on specific high-value targets is known as promiscuous attacks. Answer - ANSWER FALSE

  3. Focusing electronic attacks on specific high-value targets is known as whaling. Answer - ANSWER TRUE

  4. In a man-in-the-middle attack, an evil twin sends own attacks, impersonating the victim. Answer - ANSWER TRUE

  5. In a man-in-the-middle attack, ________. A) an evil twin must have a stronger signal than the legitimate AP B) an evil twin sends own attacks, impersonating the victim C) Both A and B D) Neither A nor B Answer - ANSWER C

A) RTS

B) CTS

C) Both A and B D) Neither A nor B Answer - ANSWER C

  1. RTS frames tell other wireless clients that you want to transmit for a given amount of time. Answer - ANSWER TRUE

  2. CTS frames tell other wireless clients that you want to transmit for a given amount of time. Answer - ANSWER FALSE

  3. CTS frames tell other clients that you have received a RTS frame. Answer - ANSWER TRUE

  4. What standard did the 802.11 Working Group create to extend 802.1X operation to WLANs with security for EAP? A) 802.11i B) 802.1i C) 802.1Xi D) None of the above Answer - ANSWER A

  5. In 802.11i, EAP outer authentication takes place before inner authentication. Answer - ANSWER TRUE

  1. In 802.11i, ________ authentication always uses SSL/TLS. A) inner B) outer C) Both A and B D) Neither A nor B Answer - ANSWER B

  2. PEAP is a popular extended EAP protocol. Answer - ANSWER TRUE

  3. 802.11i offers strong security. Answer - ANSWER TRUE

  4. The original 802.11 core security protocol, ________, was deeply flawed. A) 802.11i B) WPA C) WEP D) None of the above. The original core protocol was NOT deeply flawed. Answer - ANSWER C

  5. WEP stands for ________. A) wireless equivalent privacy B) wireless equivalent policy C) wired equivalent privacy D) wired equivalent policyAnswer - ANSWER C

  6. WEP typically takes ________ to crack today.