1. Which of the following may be deployed in a network as lower cost surveillance and early-warning tools?
A) Honeypots B) Hardware IPSs C) Hardware IDSs D) Botnets E) Stateful inspection firewalls F) Stateful logging facilities
2. Relatively speaking, firewalls operated at the application level of the seven layer OSI model are:
A) almost always less efficient. B) almost always less effective. C) almost always less secure. D) almost always less costly to setup. E) None of the choices.
3. Relatively speaking, firewalls operated at the physical level of the seven-layer OSI model are:
A) almost always less efficient. B) almost always less effective. C) almost always less secure. D) almost always less costly to setup. E) None of the choices.
4. Which of the following refers to the act of creating and using an invented scenario to persuade a target to perform an action?
A) Pretexting B) Backgrounding C) Check making D) Bounce checking E) None of the choices.
5. With Deep packet inspection, which of the following OSI layers are involved?
A) Layer 2 through Layer 7 B) Layer 3 through Layer 7 C) Layer 2 through Layer 6 D) Layer 3 through Layer 6 E) Layer 2 through Layer 5 F) None of the choices.
1. Right Answer: A Explanation: Honeypots, essentially decoy network-accessible resources, could be deployed in a network as surveillance and early-warning tools. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques.
2. Right Answer: A Explanation: Early attempts at producing firewalls operated at the application level of the seven-layer OSI model but this required too much CPU processing power.Packet filters operate at the network layer and function more efficiently because they only look at the header part of a packet.
3. Right Answer: E Explanation: Early attempts at producing firewalls operated at the application level of the seven-layer OSI model but this required too much CPU processing power.Packet filters operate at the network layer and function more efficiently because they only look at the header part of a packet. NO FIREWALL operates at the physical level.
4. Right Answer: A Explanation: Pretexting is the act of creating and using an invented scenario to persuade a target to release information or perform an action and is usually done over the telephone. It is more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information.
5. Right Answer: A Explanation: Deep packet inspection (DPI) is a form of computer network packet filtering that examines the data part of a through-passing packet, searching for non- protocol compliance or predefined criteria to decide if the packet can pass.DPI devices have the ability to look at Layer 2 through Layer 7 of the OSI model.
Leave a comment