Home > Articles

  • Print
  • + Share This
This chapter is from the book

Practice Questions (Mix and Match)

  1. Match each attack with its definition.

    1. Smurf: _____

    2. LAND: _____

    3. TRINOO: _____

    4. SYN Attack: _____

    5. Chargen: _____

    6. Ping of death: _____

     

    1. Uses two systems to bounce a continuous stream of traffic between ports 7 and 19.

    2. A SYN packet that is to and from the same address and port.

    3. A series of SYN packets are sent that fill the receiving buffer.

    4. Uses a ping packet to broadcast addresses spoofed from the victim.

    5. An early type of DDoS attack.

    6. Sends ICMP packets that are at or exceed maximum size.

    Quick Answer: 193
    Detailed Answer: 205

  2. Match each access control type with its definition.

    1. Discretionary access control: _____

    2. Mandatory access control: _____

    3. Role-based access control: _____

    4. Rule-based access control: _____

    5. Constrained user interfaces: _____

     

    1. Assigns access to groups, not users.

    2. Used with firewalls and routers.

    3. Uses sensitivity labels.

    4. Classification labeling of objects by owner.

    5. Works by restricting users to specific functions based on their role in the system.

    Quick Answer: 193
    Detailed Answer: 205

  3. Match each item with the correct authentication type.

    1. CER: _____

    2. Weakest form of encryption: _____

    3. Common access card: _____

    4. Type II error: _____

    5. Memory card: _____

    6. Pronounceable passwords: _____

     

    1. Something you know.

    2. Something you are.

    3. Something you have.

    Quick Answer: 193
    Detailed Answer: 205

  4. Match each authentication type with its definition.

    1. Centralized authentication and no backwards compatibility: _____

    2. Uses ticket-granting service: _____

    3. Allows secure web domains to exchange user authentication data: _____

    4. Uses a single authentication server: _____

    5. Uses port 389: _____

    6. Introduced by Cisco: _____

     

    1. Kerberos

    2. LDAP

    3. XTACACS

    4. SAML

    Quick Answer: 193
    Detailed Answer: 206

  • + Share This
  • 🔖 Save To Your Account