- Practice Questions
- Practice Questions (True or False)
- Practice Questions (Mix and Match)
- Quick-Check Answer Key
- Answers and Explanations
Practice Questions (Mix and Match)
Match each attack with its definition.
Smurf: _____
LAND: _____
TRINOO: _____
SYN Attack: _____
Chargen: _____
Ping of death: _____
Uses two systems to bounce a continuous stream of traffic between ports 7 and 19.
A SYN packet that is to and from the same address and port.
A series of SYN packets are sent that fill the receiving buffer.
Uses a ping packet to broadcast addresses spoofed from the victim.
An early type of DDoS attack.
Sends ICMP packets that are at or exceed maximum size.
Quick Answer: 193
Detailed Answer: 205Match each access control type with its definition.
Discretionary access control: _____
Mandatory access control: _____
Role-based access control: _____
Rule-based access control: _____
Constrained user interfaces: _____
Assigns access to groups, not users.
Used with firewalls and routers.
Uses sensitivity labels.
Classification labeling of objects by owner.
Works by restricting users to specific functions based on their role in the system.
Quick Answer: 193
Detailed Answer: 205Match each item with the correct authentication type.
CER: _____
Weakest form of encryption: _____
Common access card: _____
Type II error: _____
Memory card: _____
Pronounceable passwords: _____
Something you know.
Something you are.
Something you have.
Quick Answer: 193
Detailed Answer: 205Match each authentication type with its definition.
Centralized authentication and no backwards compatibility: _____
Uses ticket-granting service: _____
Allows secure web domains to exchange user authentication data: _____
Uses a single authentication server: _____
Uses port 389: _____
Introduced by Cisco: _____
Kerberos
LDAP
XTACACS
SAML
Quick Answer: 193
Detailed Answer: 206