Review Questions with all Answers verified for
accuracy Updated 2024/2025
Evil Twin - correct answer A situation in which a rogue wireless access point poses as
a legitimate one by broadcasting a legitimate SSID and eavesdrops on the wireless
network
Session Hijacking - correct answer Exploiting web session control by stealing a
session cookie and using it to establish a session with a remote server that still thinks
the session is valid
Buffer Overflow - correct answer A situation that occurs when a program tries to put
more data into a buffer than it was configured to hold
netstat -a - correct answer The command used to display the ports currently open on a
Windows operating system
netstat -b - correct answer The command used to display the executable involved in
creating the connection or listening port
nmap - correct answer A Linux and Windows port scanner
Worm - correct answer A type of virus that attacks computers, typically proliferates by
itself, and can deny service to networks
Zero-Day Attack - correct answer An attack that exploits a software vulnerability that is
unknown to the developer
DoS (Denial of Service) - correct answer An attack in which service is denied to a
computer, network, or server
,Directed Broadcast - correct answer A broadcast that is sent to a specific subnet
PDoS (permanent denial of
service) - correct answer A malicious attack that aims to sabotage hardware and
render it useless
Reflective/Amplified DoS Attack - correct answer An attack that uses spoofing to carry
out the attack and is a combination of a reflection attack and an amplification attack
Coordinated Attack - correct answer A type of distributed denial of service attack that is
deliberate toward a specific target and orchestrated by a controller source like the
command-and-control server in a botnet
botnet - correct answer a group of infected/compromised computers on the Internet
that are used to launch coordinated DoS attacks against another system on the network
Firewall - correct answer Hardware or software used to protect a computer network
DMZ (Demilitarized Zone) - correct answer An area used to isolate servers
Packet Filtering - correct answer Protection in which a limit is placed on the information
that can enter the network
Proxy Server - correct answer A setup in which clients go through a proxy to
communicate with secure systems
Stateful Firewall - correct answer A firewall that keeps track of data packet flow
Packet Shaper - correct answer A device that sits between a campus network and an
outside network and is configured with a set of rules that are used to prioritize data
traffic for shaping the bandwidth
,Authentication, Authorization, and Accounting (AAA) - correct answer A framework
developed to control access to computing resources, enforce policies, and audit usage
RADIUS (Remote Authentication Dial-In User Service) - correct answer most widely
used AAA protocol
UTM (Unified Threat Management) - correct answer an all-in-one solution that
integrates a wide range of security features into one appliance
site-to-site VPN - correct answer VPN that requires network hardware like a router or
firewall to create and maintain the connection
client-to-site VPN - correct answer type of VPN that provides mobile users a way to
remotely access their information from the home network
IP Tunnel - correct answer creates a virtual circuit between two endpoints and makes
the connection appear like a dedicated connection even though it spans over the
Internet infrastructure
GRE (Generic Routing Encapsulation) - correct answer A tunneling protocol developed
by Cisco and is commonly used as a site-to-site VPN
PAP (Password Authentication Protocol) - correct answer simple, unencrypted
authentication method;
commonly used by PPP for authentication
CHAP (Challenge Handshake Authentication Protocol) - correct answer encrypted
authentication method that uses the MD5 file hashing algorithm;
commonly used by PPP for authentication
Message Digest 5 - correct answer MD5
, SHA (Secure Hash Algorithm) - correct answer A cryptographic hash algorithm used
in certain government applications
Extensible Authentication Protocol - correct answer EAP
Secure Hash Algorithm - correct answer SHA-1
Jamming - correct answer The wireless network is overwhelmed with wireless traffic
Beacon - correct answer Used to identify a wireless link
Open Authentication - correct answer Basically a null authentication that can enable
any client to authenticate to an AP
Shared key Authentication - correct answer Both the client and the access point share
a key called a pre-shared key (PSK).
AES (Advance Encryption Standard) - correct answer encryption algorithm used by
WPA2
LEAP - correct answer A wireless security system used by Cisco
War Drive - correct answer A process in which attackers search for locations with an
open wireless network or a weak wireless network, so that they can gain more access
to collect information or data of connecting users
War Chalking - correct answer This is the next step after war drive, which is to leave
marks or symbols to notify other hackers about the wireless vulnerabilities of the
location.