Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ITN266

final

QuestionAnswer
DNSSEC ________. is still under development
IP addresses are 32 octets long. False
The terms octet and byte mean the same thing. True
TCP/IP's internet layer supervisory protocol is ________. ICMP
The SNMP ________ command is very dangerous. SET
A normal TCP close takes ________ segments. 4
A network that runs on the customer premises is a ________. LAN
Single-network core standards are for message delivery through ________. Both LANs and WANs
The subnet mask is one of the three parts of an IP address. False
A TCP session opening ends with a(n) ________ message. ACK
How many layers does the OSI architecture have? 7
TCP segment carries octets 5371 through 6358. What is its sequence number? 6359
At what core layer do you find WAN standards? Single-network
If two hosts are separated by seven networks, how many packets will there be along the way when a host transmits a packet to another host? 1
TCP segment carries octets 5371 through 6358 The next segment carries no data. What is that segment's sequence number? 6359
Which of the following is true? Both TCP works at the transport layer and UDP works at the transport layer
Packets are carried inside frames. True
When your mobile phone is on a network, it is a host. True
Which of the following sends passwords in the clear? FTP
In e-mail, the ________ protocol is fused or downloading new mail from the recipient's mail server to the recipient's PC. POP
The TCP ________ field is designed to control the other party's transmission rate. window
Attackers can read signals traveling over UTP without tapping the cord. True
What is the general function of the second row in the IPv4 header? To handle fragmentation and reassembly
TCP segment carries octets 4321 through 4371. What will be the acknowledgement number in the TCP segment that acknowledges this segment? 4372
To get configuration information from managed devices on the network and to change the configuration of managed devices, companies use ________. SNMP
If two hosts are separated by five networks, how many frames will there be along the way when a host transmits a packet to another host? 5
An abrupt TCP close takes ________ segments. physical link
A computer connects to the nearest switch via a ________. physical link
________ tell the attacker that a certain IP address has a live host or router. Both ICMP Echo replies and ICMP error messages
A residential access router usually contains ________. Both a DHCP server and an Ethernet switch
A mask is needed to identify the size of the network part or of the combined network and subnet parts. True
A ________ is likely to have the same address each time it goes on the Internet. server
In DNS cache poisoning, an attacker replaces the IP address of a host name with another IP address. True
The main exterior dynamic routing protocol is ________. BGP
The ________ field in a packet ensures that misaddressed packets will not circulate endlessly. TTL
Which of the following is an OSI standards agency? Both ISO and ITU-T
A device attached to a network is called a ________. host
In an IPv4 packet, the ________ field describes the contents of the packet's data field. protocol
User computers connect to ________ switches. workgroup
Security problems with protocols include ________. Both a lack of security in earlier versions and awkwardly added security
A ________ server gives an original host the IP address of another host to which the original host wishes to send packets. DNS
In ________, signals can be read without tapping the cord. UTP
In internets, different networks are connected by ________. routers
In the IETF, a proposed standard is called a Request for Comments. True
Frames are messages traveling through ________. WANs
ICMP ________. Both is used in ping transmissions and is used for error messages
An abrupt TCP close takes ________ segments. None of these.
Servers get ________. static IP addresses
Ping sends ________ messages and receives replies in the same protocol. ICMP
IPsec works with ________. Both IPv4 and IPv6
An organization with a ________ domain name must maintain one or more DNS servers. second-level
The most popular way for hackers to take over hosts today is ________. by taking over an application
SIP identity protocols are common on IP telephones. True
VoIP security can easily be implemented even if the company's basic security is weak. False
Overall for firms, which is more time consuming to patch? Applications
Attacks in which a user reaches a directory outside of the WWW root directory and its subdirectories is called a(n) ________ attack. directory traversal
Compared to full programming languages, scripts are ________ in what they can do. more limited
Accepting cookies is necessary to use many websites. True
RTP adds ________ to UDP. sequence numbers
NAT adds latency to VoIP packets. True
Which version of SNMP allows the manager to have a different shared secret with each agent? Version 3
SIP Identity protocols ________. ensure that traffic is authenticated between two companies holding public/private keys
Which comes third in a VoIP packet? RTP header
RTP is used in ________. transport
Generally speaking, vendors use similar mechanisms for downloading and installing patches. False
In VoIP, firewalls are a problem because they tend to ________. increase latency
Cookies can used to track users at a website. True
In IM, all messages pass through a ________ server. relay
Transport consists of communication to manage the network. False
On a compromised computer, if you mistype the name of a URL, you may be taken to a malicious website even if you set your browser security to high. True
To satisfy legal retention and other compliance regulations, companies should use ________ in IM. a relay server
The Skype protocol is relatively easy for corporate firewalls to filter. False
DoS attacks against VoIP can be successful even if they increase latency only slightly. True
Experts advise firms to turn on most or all applications and then harden them. False
Operating system hardening is more total work than application hardening. False
Spam over VoIP is called ________. SPIT
SYN-ACK can be best described as the second part of a three-way TCP handshake sent in response to a SYN. True
A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections. SYN flood
Which of the following is an example of a wireless attack? All of these
Wireless IDSs get their data from the company's access points. True
The most common attack against a wireless network is a ________. unauthorized network access
Which of the following measures offers strong security? Neither Turning off SSID broadcasting nor MAC access control lists
In a man-in-the-middle attack, an evil twin sends own attacks, impersonating the victim. True
Flooding the frequency of a wireless network is one method attackers use to affect the network. True
ICMP can be best described as the second part of a three-way TCP handshake sent in response to a SYN. False
Which of the following measures offers strong security? None of these
Focusing electronic attacks on specific high-value targets is known as whaling. True
________ is the process of obscuring an attackers source IP address. Spoofing
________ are compromised hosts running malware controlled by the hacker. Bots
An indirect attack occurs when an attacker tries to flood a victim with a stream of packets directly from the attacker's computer. False
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host. False
Rogue access points are unauthorized access points set up by individuals or departments. True
Using a shared initial key is dangerous in ________. WEP
________ is/are effective method(s) to preventing ARP poisoning attacks. Both Static tables and Limiting local access
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts. False
By giving unauthorized users access to a local WLAN means that they are on the local network. True
Each network interface card (NIC) has a media access control address (MAC). True
A ________ is an older attack that uses an illegally large IP packet to crash an operating system. ping of death
A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic. Ping flood
Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address. True
EAP uses RADIUS for authentication. False
Like the public switched telephone network, VoIP technology is a closed system. False
Scripts do not have the ability to permanently change your computer registry. False
RTP stands for ________. Real Time Protocol
To prevent eavesdropping, applications should ________. use encryption for confidentiality
Skype can decrypt and read user traffic. True
If a hacker takes over an application program, he or she receives the permissions with which the program runs. True
Companies are responsible for filtering sexually or racially harassing messages and can be sued for not doing so. True
Eavesdropping can be thwarted by encrypting ________. Both signaling traffic and transport traffic
Baselines are used to go beyond default installation configurations for high-value targets. True
SIP proxy servers are used in ________. signaling transmissions
Most firms do a satisfactory job overseeing the deployment of custom programs used to supplement packaged software. False
To take advantage of user typing errors, attackers register site names that are similar to those of legitimate domain names. True
________ errors may indicate that an attacker is trying to send invalid data to the server. 500
________ is used by ________ for authentication. ________ is used by ________ for authentication.
After gaining wireless access to the private network, the attach can ________. All of these
EAP uses RADIUS for authentication. False
An attacker controlling bots in a coordinated attack against a victim is known as a ________. DDoS attack
A ________ attack is when a webserver is flooded with application layer web requests. HTTP flood
Most central authentication servers are governed by the ________ standard. RADIUS
A ________ is an older attack that uses an illegally large IP packet to crash an operating system. ping of death
Rogue access points are unauthorized access points set up by individuals or departments. True
________ are an additional layer of compromised hosts that are used to manage large groups of bots. Handlers
One problem with ARP requests and replies is that they do not require authentication of verification. True
An unauthorized access point set up by individuals or departments is called a(n) ________ access point. rogue
Wireless IDSs get their data from the company's access points. true
The 802.1X protocol created for wired LANs can work in wireless LANs without significant modification. false
In a P2P attack, there is a change in traffic pattern but the overall volume of traffic is the same. true
In 802.1X, the heavy authentication work is done on ________. Neither authenticators nor clients
________ security uses 128-bit AES encryption for confidentiality and AES-CCMP for automatic rekeying. 802.11i
In regards to network security, ________ means preventing unauthorized users from gaining information about the network structure, data flowing across the network, network protocols used, or packet header values. confidentiality
Once established, botnets can be leased to other criminals for DoS attacks. True
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host. false
Rerouting traffic using ARP poisoning is an attack on ________ of a network. Both functionality and confidentiality
What standard did the 802.11 Working Group create to extend 802.1X operation to WLANs with security for EAP? 802.11i
In a man-in-the-middle attack, an evil twin sends own attacks, impersonating the victim. True
The most common attack against a wireless network is a ________. unauthorized network access
In pre-shared key mode, a passphrase should be at least ________ characters long? 20
Encryption is heavily used in commercial e-mail. False
PKI uses circles of trust. False
Which of the following uses a PKI? S/MIME
________ offers no security at all. SNMP V1
Website defacement occurs when attackers take over a computer and produce false web pages. False
Created by: Elmoremc22
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards