questions with verified answers
access mode (also called untagged mode) or trunk mode (also called tagging
mode) Ans✓✓✓-configuring a switch with VLANs, the network administrator
typically configures each switch port to operate in one of two modes:
Application (7)
Coding to prevent too much input.Firewall to prevent suspicious data from being
sent. Enable NX-bit (no-execute) functionality on physical computer. Ans✓✓✓-
The method used to mitigate a Buffer Overflow attack.
Application (7) Review source code & validate all user-entered data. Firewall: use
reverse proxy system and scan incoming packets for malicious behavior. Use web-
application firewall with rules to filter dangerous requests. Enable NX-bit (no-
execute) functionality on physical computer. Ans✓✓✓-The method used to
mitigate an SQL Injection attack.
ARP spoofing Ans✓✓✓-Which attack tricks a client into mapping an IP address to
a spoofed MAC address?
attacks occur in various OSI Layers. uses IP spoofing at its base, it goes a mile
beyond that in order to gain control, by choosing sessions from one or more
layers to be hijacked.
Intrusion Prevention systems and IPSec can help. Ans✓✓✓-The method used to
mitigate a Man in the Middle (MitM) attack.
, Buffer Overflow Ans✓✓✓-similar to SQL Injection but instead of SQL, they enter
too much information into the form which causes the app to crash or other
damage.
Data Link (2)
Configure the switch Access Control File per the vendor's recommendation.
Ans✓✓✓-The method used to mitigate a VLAN Hopping attack.
Database Control Ans✓✓✓-SQL Injection and Buffer Overflow
Deauth Attack (Deauthentication (abbreviated deauth)) Ans✓✓✓-a denial-of-
service (DoS) attack where the attacker can force any client (or even every client)
off of the network.
Denial of Service (DoS) Ans✓✓✓-Denying service to a computer, network or
network server by overwhelming the victim with large amounts of useless traffic.
One computer is used to flood a server with TCP and UDP packets.
Don't download attachments. Anti-virus software. Ans✓✓✓-How to protect/fight
Worms.
Insider Threats Ans✓✓✓-A disgruntled insider may have a motive. Whenever you
combine motive and opportunity, you have a substantially increased risk of
trouble.
Insider Threats Ans✓✓✓-Some of the most potent threats come from people
within your organization. Because they have legitimate access to systems, they
are in a position to hack from the inside of the network, often undetected.