
MCyber_Chap9
Authored by Marcus Phang
Information Technology (IT)
Professional Development
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?
Answer explanation
Antimalware programs may detect viruses using three different approaches:
1) Signature-based – by recognizing various characteristics of known malware files
2) Heuristics-based – by recognizing general features shared by various types of malware
3) Behavior-based – through analysis of suspicious activities
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which device in a LAN infrastructure is susceptible to MAC address-table overflow and spoofing attacks?
Answer explanation
Switches are LAN infrastructure devices interconnecting endpoints.
They are susceptible to LAN-related attacks including MAC address-table overflow attacks, spoofing attacks, LAN storm attacks, STP manipulation attacks, and VLAN attacks.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location?
Answer explanation
The telemetry functionality in most host-based security suites provides robust logging functionality and submits logs to a central location for analysis.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which technology might increase the security challenge to the implementation of IoT in an enterprise environment?
Answer explanation
With cloud computing, boundaries of enterprise networks are expanded to include locations on the Internet for which the enterprises are not responsible.
Malicious software might access the internal network endpoints to attack internal networks.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which statement describes agentless antivirus protection?
Answer explanation
Host-based antivirus protection is also known as agent-based. Agent-based antivirus runs on every protected machine.
Agentless antivirus protection performs scans on hosts from a centralized system.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which HIDS is an open source product?
Answer explanation
The Open Source HIDS SECurity (OSSEC) software is an open source HIDS that uses a central manager server and agents that are installed on the hosts that are to be monitored.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In Windows Firewall, when is the Domain profile applied?
Answer explanation
The Domain profile in Windows Firewall configuration is for connections to a trusted network, such as a business network, that is assumed to have an adequate security infrastructure.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?