DRAG DROP
Match the OSI network model Layer 3 function to the correct description.
Select and Place:
Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
A. It cannot identify command-and-control traffic.
B. It cannot monitor all potential network ports.
C. It assumes that all internal devices are untrusted.
D. It assumes that every internal endpoint can be trusted.
Which mobile device management feature prevents jailbreaking or rooting?
A. software distribution
B. malware protection
C. policy enforcement
D. data loss prevention
Which type of malware is self-replicating but must first infect a host program and be executed by a user or process?
A. vulnerability
B. worm
C. exploit
D. virus
You discover malware has corrupted the BIOS on your laptop. Which type of malware is this?
A. bootkit
B. exploit
C. rootkit
D. vulnerability
Which two items operate at the network layer in the OSI network model? (Choose two.)
A. IP address
B. router
C. switch
D. MAC address
An attacker emails a malicious URL links to 50,000 email addresses. The email states that users can click the link to view the latest celebrity news, but the link also secretly infects the user's laptop. This scenario describes which type of attack?
A. whailing
B. phishing
C. drive-by download
D. pharming
What is an effective defense against a denial-of-service attack?
A. deploy a firewall to reject suspect network packets
B. flood the DoS source with ICMP echo requests to reduce attack output
C. contact the upstream ISP and disconnect affected network interfaces
D. configure additional network interfaces for legitimate network traffic