What attack involves the perpetrator sending spoofed packet(s) wich contains the same destination and source IP address as the remote host, the same port for the source and destination, having the SYN flag, and targeting any open ports that are open on the remote host?
At which OSI/ISO layer is an encrypted authentication between a client software package and a firewall performed?
Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided?
Which communication method is characterized by very high speed transmission rates that are governed by electronic clock timing signals?
Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking vector?
Which of the following offers security to wireless communications?
Why is traffic across a packet switched network difficult to monitor?
Secure Shell (SSH) is a strong method of performing:
In this type of attack, the intruder re-routes data traffic from a network device to a personal machine. This diversion allows an attacker to gain access to critical resources and user credentials, such as passwords, and to gain unauthorized access to critical systems of an organization. Pick the best choice below.
What enables a workstation to boot without requiring a hard or floppy disk drive?
What IDS approach relies on a database of known attacks?
Who is responsible for providing reports to the senior management on the effectiveness of the security controls?
The fact that a network-based IDS reviews packets payload and headers enable which of the following?
Which of the following tools is NOT likely to be used by a hacker?
Which of the following best describes signature-based detection?
Which conceptual approach to intrusion detection system is the most common?
Which of the following reviews system and event logs to detect attacks on the host and determine if the attack was successful?
Which of the following is an issue with signature-based intrusion detection systems?
Which of the following questions are least likely to help in assessing controls covering audit trails?
Which of the following types of Intrusion Detection Systems uses behavioral characteristics of a system’s operation or network traffic to draw conclusions on whether the traffic represents a risk to the network or host?