1. Identify three techniques used in social engineering. (Choose three.)
• fishing
• vishing
• phishing
• spamming
• pretexting
• junk mailing
2. During a pretexting event, how is a target typically contacted?
• by e-mail
• by phone
• in person
• through another person
3. While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
• worm
• virus
• Trojan horse
• denial of service
4. What is a major characteristic of a Worm?
• malicious software that copies itself into other executable programs
• tricks users into running the infected software
• a set of computer instructions that lies dormant until triggered by a specific event
• exploits vulnerabilities with the intent of propagating itself across a network
5. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
• Trojan horse
• brute force
• ping of death
• SYN flooding
6. What type of advertising is typically annoying and associated with a specific website that is being visited?
• adware
• popups
• spyware
• tracking cookies
7. What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
• brute force
• spam
• spyware
• tracking cookies
8. What part of the security policy states what applications and usages are permitted or denied?
• identification and authentication
• remote access
• acceptable use
• incident handling
9. Which statement is true regarding anti-virus software?
• Only e-mail programs need to be protected.
• Only hard drives can be protected.
• Only after a virus is known can an anti-virus update be created for it.
• Only computers with a direct Internet connection need it.
10. Which two statements are true concerning anti-spam software? (Choose two.)
• Anti-spam software can be loaded on either the end-user PC or the ISP server, but not both.
• When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
• Installing anti-spam software should be a low priority on the network.
• Even with anti-spam software installed, users should be careful when opening e-mail attachments.
• Virus warning e-mails that are not identified as spam via anti-spam software should be forwarded to other users immediately.
11. What term is used to describe a dedicated hardware device that provides firewall services?
• server-based
• integrated
• personal
• appliance-based
12. Which acronym refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
• SPI
• DMZ
• ISR
• ISP
13. Which statement is true about port forwarding within a Linksys integrated router?
• Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
• Only external traffic that is destined for specific internal ports is denied. All other traffic is permitted.
• Only internal traffic that is destined for specific external ports is permitted. All other traffic is denied.
• Only internal traffic that is destined for specific external ports is denied. All other traffic is permitted.
14. To which part of the network does the wireless access point part of a Linksys integrated router connect?
• DMZ
• external
• internal
• a network other than the wired network
15. Refer to the graphic. What is the purpose of the Internet Filter option of Filter IDENT (Port 113. on the Linksys integrated router?
• to require a user ID and password to access the router
• to prevent outside intruders from attacking the router through the Internet
• to require a pre-programmed MAC address or IP address to access the router
• to disable tracking of internal IP addresses so they cannot be spoofed by outside devices
16. What statement is true about security configuration on a Linksys integrated router?
• A DMZ is not supported.
• The router is an example of a server-based firewall.
• The router is an example of an application-based firewall.
• Internet access can be denied for specific days and times.
17. What environment would be best suited for a two-firewall network design?
• a large corporate environment
• a home environment with 10 or fewer hosts
• a home environment that needs VPN access
• a smaller, less congested business environment
18. What is one function that is provided by a vulnerability analysis tool?
• It provides various views of possible attack paths.
• It identifies missing security updates on a computer.
• It identifies wireless weak points such as rogue access points.
• It identifies all network devices on the network that do not have a firewall installed.
• It identifies MAC and IP addresses that have not been authenticated on the network.
19. Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
• Periodically update anti-virus software.
• Be aware of normal network traffic patterns.
• Periodically update the host operating system.
• Activate the firewall on a Linksys integrated router.
• Configure login permissions on the integrated router.
• Disable the wireless network when a vulnerability analysis is being performed.
20. What best practice relates to wireless access point security?
• activation of a popup stopper
• a change of the default IP address
• an update in the antivirus software definitions
• physically securing the cable between the access point and client
21. Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
• It prevents packets based on the application that makes the request.
• It allows packets based on approved internal MAC or IP addresses.
• It requires that packets coming into the router be responses to internal host requests.
• It translates an internal address or group of addresses into an outside, public address.
TimE
Labels
- CCNA Discovery 1 Version 4 Networking for Home and Small Businesses (9)
- CCNA Discovery 2 : Working at a Small-to-Medium Business or ISP (9)
- CCNA Discovery 3 : Introducing Routing and Switching in the Enterprise (10)
- CCNA Discovery 4 : Designing and Supporting Computer Networks (Version 4.0) (9)
- HardwarE (28)
- healty (3)
- Hot news IT (43)
- Lain-lain (4)
- LinuX (10)
- SoftWare (13)
Blog Archive
-
▼
2009
(150)
-
▼
Juli
(102)
- Final eXam Discovery 2 versi 4.0
- CCNA Discovery 2 : Module 8 Exam Answers
- CCNA Discovery 2 : Module 7 Exam Answers
- CCNA Discovery 2 : Module 6 Exam Answers
- CCNA Discovery 2 : Module 5 Exam Answers
- CCNA Discovery 2 : Module 4 Exam Answers
- CCNA Discovery 2 : Module 3 Exam Answers
- CCNA Discovery 2 : Module 2 Exam Answers
- CCNA Discovery 2 : Module 1 Exam Answers
- CCNA Discovery 1 : Module 2 Exam Answers
- CCNA Discovery 1 : Module 9 Exam Answers
- CCNA Discovery 1 : Module 8 Exam Answers
- CCNA Discovery 1 : Module 7 Exam Answers
- CCNA Discovery 1 : Module 6 Exam Answers
- CCNA Discovery 1 : Module 5 Exam Answers
- CCNA Discovery 1 : Module 4 Exam Answers
- CCNA Discovery 1 : Module 3 Exam Answers
- CCNA Discovery 1 : Module 1 Exam Answers
- Software BlackBerry Juga Bisa Berbahaya
- Situs Forum PHPBB.com dihack
- Telah Dirilis patch untuk Mengatasi Bug security p...
- Sniffing Keystrokes via Laser dan Keyboard
- BlankOn 5.0 Resmi Dirilis
- Linux: Netbook Open Source Harusnya Gratis!
- Microsoft Mulai Rayu Komunitas Linux Kernel
- Mana yang Lebih Baik, Moblin, Windows 7 Atau Chrom...
- 60 Persen Perusahaan Tak Ingin Pakai Windows 7
- Thunderbird 3 beta 3 Ready for Download
- 10 Trik Membuat Linux Lebih Cepat
- Linux Firewall Distribution iPCop versi 1.4.20
- Linux Gibraltar Firewall 2.6 Telah Diluncurkan
- Dell Gunakan Ubuntu Untuk Laptop Terbarunya
- Gawat, AVG Deteksi Malware Baru di Windows
- Hati-Hati, Trojan Michael Jackson Lebih Mengganas
- Trojan Sexy Space Asal China Racuni Ponsel Symbian
- Virus VBS/Cryf.A,Canggih Bisa Rusak CD/DV ROM
- Gawat, Hacker Curi Data Rahasia Keamanan Twitter
- Microsoft Bikin 6 Paket Multitouch untuk Windows 7
- Free Download Windows 7 Release Candidate
- Inilah Salah Satu Kelemahan Windows 7
- Akhirnya, Microsoft Jual Windows 7 Tanpa IE
- Windows 7 Hadir Lebih Murah Dibandingkan Vista
- Microsoft Gratiskan Upgrade Windows 7 untuk Vista
- AVG LinkScanner, Proteksi Handal untuk Ancaman Online
- Chrome OS, System Buatan Google Saingi Windows
- AD-AWARE Pro 8.0.2, Better Than Antivirus Program
- Office 2010 32 Bit dan 64 Bit Bakal Hadir dalam 1 DVD
- Adobe Launching ColdFusion 9 dan ColdFusion Builder
- Stirling dan Geneva, Solusi Keamanan Terbaru dari ...
- F-Secure Mobile Security, Program Pengaman Ponsel ...
- Logitech Totally Rad G19 Gaming Keyboard Telah Dip...
- Notebook ASUS K Series K40IN-A1 Siap Gebrak Amerika
- MacBook Upgrade Laptop 13 Inch Low-End Namun Harga...
- mCubed RipNAS SSD Berkapasitas 500GB 46 Juta Rupiah
- AMD Hadirkan Prosesor Athlon II X2 250 dan Phenom ...
- InnoDisk Luncurkan nanoSSD 128 GB
- A-Data NH92, Hardisk Portable Tertipis di Dunia
- NVidia Luncurkan Kartu Memori EVGA untuk Mac Pros
- OCZ SSD Terbaru Berukuran Mungil 2,5 Inchi
- Linksys Perkenalkan Router WRT160NL Berbasis Linux...
- Lenovo S12 Dapatkan Opsi VIA Nano
- Acer Perkenalkan PC Desktop Aspire M5800 dan M3800
- TSMC Mendorong Kisaran 130nm Sebagai Standar Sel T...
- Proyektor iJector Lancer Seharga 700 USD Menjadi P...
- eMachines Hadirkan PC Desktop ET1300-02, ET 1810-0...
- EMTEC Jadi Saingan Baru Pada Pasaran Nettop Dengan...
- Fujitsu Perkenalkan FUTRO S100 Dengan Tambahan VIA...
- Intel Core i5 750 Hadir Bersama Core i7 Pada Tangg...
- hField Technologies Perkenalkan Adaptor WiFi Jarak...
- Hitachi SATA Desktar, Harddisk 2TB Paling oke...
- Intel Luncurkan Nehalem Bulan Depan
- Jam Audio Player Plus Bluetooth dari Sony Ericsson
- Asus P6X58 Premium, Motherbard Pertama Support USB...
- Lebih Hemat Tempat, Desktop All-In-One Dell Vostro
- Asus P6TD Deluxe, Support Intel Core i7 dan RAM 24GB
- 2 Flashdisk 4GB dalam 1 Tempat? Pakai Split Stick
- EnCore, Processor Hemat Energi Baru Telah Dikemban...
- Belum Rilis, Windows 7 Sudah Kena Hack?
- Beli Motor, Dapat Laptop Plus Akses MX-Speedy Gratis?
- Microsoft Siapkan Windows 8
- Sambut Akses Internet Wireless Kecepatan Tinggi WiMAX
- Acer Bocorkan Rahasia Peluncuran Windows 7
- Windows 7, New System Vista Killer
- Gmail telah siap dengan versi Basic HTML untuk ko...
- SATA Revision 3.0, Harddisk Kecepatan Transfer 6 Gbps
- Bayi 9 Bulan Sudah Kenal Laptop?
- Google Tanamkan Pelacak di 92 Persen Website
- Google Squared, Tool Baru Cukup ‘Menyesatkan
- Apple Safari 4, Capai 11 Juta Download dalam 3 Hari
- 2009, Pengguna Internet Bakal Melebihi 10 Juta Orang
- Printer HP Photosmart Premium, Cetak Gambar Tanpa PC
- Kalah dari Facebook, Friendster Dijual ke Asia
- Pemakai Microsoft Bing ( Search Engine) Bertambah ...
- Perang Sengit Microsoft-Google, Office 2010 Digrat...
- Menggali Fenomena Maraknya Hotspot
- Ular Berbisa’ Incar Account Yahoo Anda
- 2010, Nokia Gelontorkan Ponsel 4G
- CEO Microsoft Kunjungi Indonesia
- ATI Radeon HD 4770, VGA Pertama dengan Chip 40nm
- Pendiri Yahoo Bertandang ke Indonesia
-
▼
Juli
(102)
Translate
Counter
Diposting oleh
vanz blog
Jumat, 31 Juli 2009
Langganan:
Posting Komentar (Atom)