Search Header Logo

MCyber_Chap9

Authored by Marcus Phang

Information Technology (IT)

Professional Development

Used 5+ times

MCyber_Chap9
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?

Routing-based
Behavior-based
Signature-based
Heuristics-based

Answer explanation

Antimalware programs may detect viruses using three different approaches:

1) Signature-based – by recognizing various characteristics of known malware files

2) Heuristics-based – by recognizing general features shared by various types of malware

3) Behavior-based – through analysis of suspicious activities

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which device in a LAN infrastructure is susceptible to MAC address-table overflow and spoofing attacks?

Firewall
Workstation
Server
Switch

Answer explanation

Switches are LAN infrastructure devices interconnecting endpoints.

They are susceptible to LAN-related attacks including MAC address-table overflow attacks, spoofing attacks, LAN storm attacks, STP manipulation attacks, and VLAN attacks.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location?

Intrusion detection and prevention
Anti-phishing
Telemetry
Safe browsing

Answer explanation

The telemetry functionality in most host-based security suites provides robust logging functionality and submits logs to a central location for analysis.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which technology might increase the security challenge to the implementation of IoT in an enterprise environment?

CPU processing speed
Data storage
Cloud computing
Network bandwidth

Answer explanation

With cloud computing, boundaries of enterprise networks are expanded to include locations on the Internet for which the enterprises are not responsible.

Malicious software might access the internal network endpoints to attack internal networks.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which statement describes agentless antivirus protection?

Host-based antivirus systems provide agentless antivirus protection.
The antivirus protection is provided by the router that is connected to a cloud service.
The antivirus protection is provided by the ISP.
Antivirus scans are performed on hosts from a centralized system.

Answer explanation

Host-based antivirus protection is also known as agent-based. Agent-based antivirus runs on every protected machine.

Agentless antivirus protection performs scans on hosts from a centralized system.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which HIDS is an open source product?

Tripwire
OSSEC
Cisco AMP
AlienVault USM

Answer explanation

The Open Source HIDS SECurity (OSSEC) software is an open source HIDS that uses a central manager server and agents that are installed on the hosts that are to be monitored.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Windows Firewall, when is the Domain profile applied?

When the host accesses the Internet
When the host checks emails from an enterprise email server
When the host is connected to a trusted network such as an internal business network
When the host is connected to an isolated network from the Internet by another security device

Answer explanation

The Domain profile in Windows Firewall configuration is for connections to a trusted network, such as a business network, that is assumed to have an adequate security infrastructure.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?