ITS 4550 - Internet and Web Security
Review for Second Test
The following questions are provided to help you study for the second
test. Do not expect to see these exact questions on the test.
- What is the objective of MAC Flooding?
- Which of the following are categories of social engineering?
- A network of private computers infected with malicious software and
controlled as a group without the owners' knowledge is known as what?
- Name a tool that can help reduce the risk of a wardriver attacking
- Which type of routing protocol advertises only new paths to other
routers on the
- Which type of IDS can send an access list to a router or firewall
when an intrusion is
detected on a network?
- What is a DDos attack?
- What is a Rootkit?
- What is a Trojan Horse?
- The book describes some methods to combat sniffing. What tactics are
- What year does the text note that Linux was originally designed?
- What are the 7 phases of the incident response process?
- What is the Adversary Model of Cybercrime?
- What is the current most secure wireless protocol?
- Give an example of a social engineering attack
- What DoS attack is typically carried out by an army of co-opted machines,
which may number in the hundreds or thousands, depending on the success
of the attacker in organizing an attack group?
- What are the three categories of DoS attacks?
- In an ___________ attack, the attacker lies to the switch to divert
traffic to the attacker's port. As the text explains, the attacker may
forward the received packets to the correct device in order to minimize
traffic and eliminate packet loss. This works best when the attacker's
lie is about devices that are a hop or more away. The lie keeps the
traffic on the same network, and the attacker can just send the packets
across a router to make it look like they arrived as intended.
- According to our author, there are three laws that are significant
in dealing with malware. What three laws are they and why are
- After conducting a scan on the target host, what is the next step
called and what does is the purpose?
- What is SIEM and why is it important to a network defensive plan?
- What does a VPN do?
- What is the goal of a cipher?
- What is nonrepudiation?
- What are the steps involved in the incident response process?
- Which of the following is the least secure wireless encryption, WEP,
- Documentation should be written in which portion of the incident response
- Name 3 Tools that can be used to help map a network.
- What is a Ransomware?
- What ia a Distributed Denial of Service attack?
- What is the basic command structure in Linux?
- Which if these is not a sniffing tool? (It's a session hijack tool)
- True or False: A password manager is a recommended piece of software.
- Name a tool used for hash cracking.
- In what phase of an attack does information gathering happen
- What is the difference between an audit and risk assessment
- What is the purpose of whitelist MAC filtering?
- What is a Man-in-the-Middle attack?
- What is the best WLAN encryption method?
WEP, WOOP, WPA2, WPA3
- What is Bluejacking?
- What is a SYN flood attack?
- What is a key logger?
- What is footprinting?
- What is used to prevent web crawlers from accessing certain sections
of a website?
- What is a good way to prevent SQL related attacks?
- What is a VPN?
- Why would someone need a VPN?
- What is a ddos attack?
- Why are anti-virus signatures important to keep updated?
- What are the three stages of the TCP/IP handshake?
- Why are tools like wireshark important?
- What are the biggest difference between IDS and IPS?
- When creating a defense plan what should you consider?
What is the difference between a worm and a trojan?
- What 4 tools can be blamed for:
- Providing information about registered users, or assigned agents,
of domains, IP addresses, or system
- Find information about a resource stored in the DNS
- Give you info of the range of Ip addresses
- Traceroutes to determine the location of the network