WSEC Module 3 quiz/exam questions and answers

 

1.      Using several different types of security instead of just one is known as

            a. limiting

            b. layering

            c. multi-security levels (MSL)

            d. rootkits

             

2.      A demilitarized zone (DMZ) is the term used for separate network that sits outside the secure network perimeter and is protected by a firewall. True or False?

 

3.      _____ replaces the sender’s actual IP address with another IP address. network address translation (NAT)

 

4.      Instead of giving each outgoing packet a different IP address, _____ assigns the same IP address but a different port number. port address translation (PAT)

 

5.      How does antispyware differ from antivirus software?

Antispyware software must be regularly updated defend against the most recent spyware attacks. Antispyware can be set to provide both continuous real-time monitoring as well as perform a complete scan of the entire computer system at one time. And like antivirus software, antispyware provides good visual tools regarding the system scan.

 

6.      What is a rootkit and how does it work?

A rootkit is a set of software tools used by an attacker to break into a computer and obtain special operating system privileges in order to both perform unauthorized functions and also hide all traces of its existence. A rootkit often includes several programs designed to monitor traffic, create a back door into the computer, change log files and attack other network devices. A rootkit itself causes no direct damage to the computer; rather, its function is to hide the presence of other types of malicious software. Rootkits accomplish this hiding by removing traces of log-in records, log entries and related processes.

 

7.      Explain how obscurity can be a valuable tool in protecting a wireless network.

 

In wireless information security, defending systems through obscurity can be a valuable tool. It is important not to advertise what security is in place, the vendor of the equipment, or any other seemingly harmless information that could be used in an attack. For example, a wireless gateway that transmits the service set identifier (SSID) of “Smith Family” or “ABC Corp” is providing information regarding the location of the WLAN that an attacker may find useful. Another example is user passwords. To predictably alter passwords when they expire (use password SOCCER1 until it expires and then use SOCCER2 until it expires, etc.) is unwise. Obscuring passwords by making each one unrelated to the previous password will provide an additional level of security through obscurity.

 

8.   The weakest type of encryption for sending a single document over a WLAN is

a. private key cryptography

            b. WPA2

            c. AES

            d. public key cryptography

             

9.      Each of the following are public key cryptography tools used for encrypting files for transmission except

a. Pretty Good Privacy (PGP)

b. Secure Copy (SCP)

c. Cryptographic File System (CFS)

d. Wired Equivalent Privacy (WEP)