Denial of Service attack brute-force attack IP spoofing attack packet sniffer attack
18 Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)
virus scanning data encryption
anti-spoofing technologies intrusion protection systems applying user authentication
19. Which phase of worm mitigation involves terminating the worm process,
removing modified files or system settings that the worm introduced, and patching the vulnerability that the worm used to exploit the system?
containment inoculation quarantine treatment
20. Which characteristic best describes the network security Compliance
domain as specified by the ISO/IEC?
the integration of security into applications
an inventory and classification scheme for information assets the restriction of access rights to networks, systems, applications, functions, and data
the process of ensuring conformance with security information policies,
standards, and regulations
21. Which statement describes phone freaking?
A hacker uses password-cracking programs to gain access to a computer via a dialup account.
A hacker gains unauthorized access to networks via wireless access points.
A hacker mimics a tone using a whistle to make free long-distance calls
on an analog telephone network.
A hacker uses a program that automatically scans telephone numbers within a local area, dialing each one in search of computers, bulletin board systems, and fax machines.
22. Which two statements describe access attacks? (Choose two.)
Port redirection attacks use a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN. Password attacks can be implemented using brute-force attack
methods, Trojan Horses, or packet sniffers.
Buffer overflow attacks write data beyond the allocated buffer memory
to overwrite valid data or exploit systems to execute malicious code.
Port scanning attacks scan a range of TCP or UDP port numbers on a host to detect listening services.
Trust exploitation attacks can use a laptop acting as a rogue access point to capture and copy all network traffic in a public location on a wireless hotspot.