Page1 Page2 Page3 Page4 Page5 Page6 Page7
121. The Internet architecture provides an unregulated network path to attack innocent hosts. Denial-of-service (DoS) attacks exploit this to target mission-critical services. DoS attacks, are explicit attempts to block legitimate users system access by reducing system availability. Any physical or host-based intrusions are generally addressed through hardened security policies and authentication mechanisms. Although software patching defends against some attacks, it fails to safeguard against DoS flooding attacks, which exploit the unregulated forwarding of Internet packets.
122. Authentication Types:
123. Sensitivity labels are associated with Mandatory Access Control (MAC).
124. Computer log files can be tampered with by a hacker to erase any intrusions. Computer logs can be protected using the following methods:
Implementing all the above precautions ensures that the log files are
safe from being tampered.
125. A hacker begins a DDoS attack by exploiting a vulnerability in one computer system and making it the DDoS "master", also called as “zombie”. It is from the zombie that the intruder identifies and communicates with other systems that can be compromised. The intruder loads hacking tools on the compromised systems. With a single command, the intruder instructs the controlled machines to launch one of many flood attacks against a specified target. This causes Distributed Denial of Service (DDoS) attack on the target computer.
126. Log Files Explained:
127. Security policy planning should include the following:
128. “Single sign-on” enables one to use all the eligible services with one sign-in. Though other terms appear relevant, they are not widely used for describing this type of service.
129. Always try to download, and apply latest patches and service packs (if any) directly from the manufacturer’s website. Downloading from unreliable sources may compromise the system security.
130. SLA (Short for Service Level Agreement) is the formal negotiated document between two parties. It is a legal document that binds both the parties during the tenure of the agreement.
DRP (stands for Disaster Recovery Planning), security audit, and invoice are not relevant answers.
131. A host based IDS should be place on a host computer such as a server. Network based IDS is typically placed on a network device such as a router.
132. In IP spoofing, the attacker uses somebody else’s IP address as the source IP address. Since routers forward packets based on the destination IP address, they simply forward the packets to the destination without verifying the genuineness of the source IP address.
133. A digital certificate is a credential issued by a trusted authority that binds you (and individual or an organization) to an identity that can be recognized and verified electronically by other agencies. Locally issued digital certificates are valid only within an organizations network (like intranet). Therefore, any secure pages or digital signatures containing local registration will not work on the Internet.
134. A personal firewall is software that resides on the end users computers. This is different from a regular firewall, in the sense that a personal firewall is geared to protect a single user computer.
135. Smurf attack is a denial-of-service attack that uses spoofed broadcast ping messages to flood a target system
136. DDoS, Short for Distributed Denial of Service, it is an attack where multiple compromised systems (which are usually infected with a Trojan) are used to send requests to a single system causing target machine to become unstable or serve its legitimate users.
137. PGP certificates differ from X.509 certificates in two ways:
Cert-Ex™ Exam Simulators, Cert-Ex™ Network Simulator, Cert-Ex™ Cheatsheets are written independently by CertExams.com and not affiliated or authorized by respective certification providers. Cert-Ex™ is a trade mark of CertExams.com or entity representing Certexams.com.Security+® is a trademark of CompTIA™ organization.