Please answer all of the following questions: 16.1 Several users have received a
ID: 3696661 • Letter: P
Question
Please answer all of the following questions:
16.1 Several users have received an email that says it is from the company’s benefits provider. Users are asked to click a link in the email and provide their personal information so that they can access a new benefits management web site. Upon investigation, you discover that your company’s benefits provider did not send the email. What kind of attack is this?
a. man in the middle b. phishing c. denial of service d. war driving
16.2 Which statements about worms and viruses are true? (Choose two.)
a. Worms can independently replicate themselves on different hosts
b. Viruses can independently replicate themselves on different hosts
c. Worms require user action, such as opening a file, to replicate
d. Viruses secretly attach themselves to a document or program
16.3 An IT staffer employed by your organization wrote a database application several years ago to manage employee time-off requests. He was recently terminated by the company. When that happened, a latent virus that he had hidden within his application executed and destroyed all of the data in the employee time-off database. What kind of malware is this?
a. Keylogger b. Logic bomb c. Trojan d. Spyware
16.4 You are helping a small startup business design its network. The business’s main server will host a mission-critical database application that will store sensitive information. The business will also host a web server for customers. Where should the web server be placed?
a. On the internal network behind a firewall
b. On the internal network behind a NAT router
c. In the demilitarized zone (DMZ)
16.5 This type of malware pretends to do one thing while doing something evil.
a. rootkit b. macro c. worm d. Trojan
16.6 This type of program hides the presence of malware.
a. spyware b. virus c. adware d. rootkit
16.7 What type of attack uses zombie computers to bring a network down under a massive number of requests?
a. DDOS b. phishing c. social engineering d. man in the middle
16.8 Which type of attack involves the attacker inserting himself into a conversation between two others?
a. phishing b. man in the middle c. malware d. leeching
Describe one way to provide protection against physical intrusion.
Describe one way to provide protection against hardware failures.
A password is an authentication method based on what a user knows. Another way to authenticate, called biometrics, is based on who the user is.
List two kinds of biometrics.
What is one disadvantage of biometric authentication?
Your boss has asked you to set up a new network for your office. There are currently 10 employees. The network should include wired Ethernet connections to each work area, a wireless network, and a web server.
List the requirements, including: the number of workstations and servers, required peripherals, contents of the telecommunications room, and security features.
Sketch a logical design showing the internet connection, the gateway router, a switch, an access point, peripherals, and a few hosts.
Specify the switch, including the number of ports, the network speed, and any other necessary features, such as VLAN support.
Specify the AP, including the version of 802.11 used and the encryption used.
Specify how your design will meet the security requirements in (a) above.
Explanation / Answer
Question and Answers
16.8 Which type of attack involves the attacker inserting himself into a conversation
between two others?
a. phishing b. man in the middle c. malware d. leeching
Answer (b) man in the middle.
16.5 This type of malware pretends to do one thing while doing something evil.
a. rootkit b. macro c. worm d. Trojan
Answer (d) Trojan
16.6 This type of program hides the presence of malware.
a. spyware b. virus c. adware d. rootkit
Answer (d) rootkit
16.7 What type of attack uses zombie computers to bring a network down under a massive number of requests?
a. DDOS b. phishing c. social engineering d. man in the middle
Answer (a) DDOS
16.2 Which statements about worms and viruses are true? (Choose two.)
a. Worms can independently replicate themselves on different hosts
b. Viruses can independently replicate themselves on different hosts
c. Worms require user action, such as opening a file, to replicate
d. Viruses secretly attach themselves to a document or program
Answer (a) (c)
a. Worms can independently replicate themselves on different hosts
c. Worms require user action, such as opening a file, to replicate
16.1 Several users have received an email that says it is from the company’s benefits provider. Users are asked to click a link in the email and provide their personal information
so that they can access a new benefits management web site. Upon investigation, you
discover that your company’s benefits provider did not send the email. What kind of attack
is this?
a. man in the middle b. phishing c. denial of service d. war driving
Answer (b) phising
16.3 An IT staffer employed by your organization wrote a database application several
years ago to manage employee time-off requests. He was recently terminated by the
company. When that happened, a latent virus that he had hidden within his application executed and destroyed all of the data in the employee time-off database. What kind of
malware is this?
a. Keylogger b. Logic bomb c. Trojan d. Spyware
Answer (d) Spyware
16.4 You are helping a small startup business design its network. The business’s main server
will host a mission-critical database application that will store sensitive information. The
business will also host a web server for customers. Where should the web server be
placed?
a. On the internal network behind a firewall
b. On the internal network behind a NAT router
c. In the demilitarized zone (DMZ)
Answer (b) On the internal network behind a NAT router
List two kinds of biometrics.
DNA Marching
EAR
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.