Devry SEC 572 Week 8 Final Exam
Question 1 5
(TCO A) During the _____ phase of the attack process, the attacker extracts information.
Question 2 5
(TCO A) The target network has been thoroughly scanned. Which is the next phase of the hacking process?
Question 3 5
(TCO B) The scope section of a security policy deals with _____.
- The geographic area the policy covers
- The time period the policy covers
- The space the policy covers
- The personnel that the policy covers
Question 4 5
(TCO B) The security response team is responsible for _____.
- investigating personnel issues
- tactical and strategic security issues
- hiring outside contractors
- consistency evaluation
Question 5 5
(TCO C) The 3DES algorithm uses _____ separate keys.
Wait.... Hire Me To Get 100% Original Help In . With No Upfront Fees. Watch The Video Below For More Information & How It Works!
Name: Jennifer Lucas
Status: Online ⬤
Classes Taken: 3878
Question 6 5
(TCO C) The AES algorithm was announced by _____ in 2001.
- the NAS
- the NIST
Question 7 5
(TCO D) The component of network security that ensures that data being sent or received cannot be read by unauthorized users is _____.
- data integrity
- data confidentiality
- data and system availability
- data and user authentication
Question 8 5
(TCO E) An extranet VPN provides secure connections between you and your suppliers for _____.
Question 9 5
(TCO F) Which step is not a wireless LAN security measure?
- Use 802.1X methods for authentication and key management.
- If using a session timeout, set it to 10 hours or more.
- Configure your wireless AP as a closed network.
- Provision the wireless network behind a firewall.
Question 10 5
(TCO G) For physical security, the surfaces that can be attacked include the floor, walls, ceiling, and _____.
Question 11 25
(TCO A) List and explain three of the motivations of those that might attack a computer network. Which of the three is the most dangerous? Why?
Question 12 25
(TCO A) How is an ICMP echo reply an effective attack method? Explain wh
Question 13 25
(TCO B) Discuss the following.
(a) How does a man-in-the middle attack objective differ from a Smurf attack objective?
(b) What are the similarities?
(c) How are each of the attacks mitigated
Question 14 25
(TCO B) What are three things you should keep in mind when writing or reviewing a security policy?
Question 15 25
(TCO C) Discuss whether Telnet or SSH is the more secure method to use to make a remote connection to a device and why.
Question 16 25
(TCO C) What are the three elements of AAA? Explain what each one does.
Question 17 25
(TCO D) What is a firewall?
(TCO E) When tunneling data in IPsec, what are the three protocols that play a role in process? What does each one do?
Question 19 25
(TCO F) Are wireless networks vulnerable to the same types of denial-of-service attacks as wired networks? Are they vulnerable to any additional attacks that wired networks are not?
Question 20 25
(TCO G) What is the difference between a man-in-the-middle attack and a denial-of-service attack?
Question 21 20
(TCO B) Name and explain four common security policies.