click below
click below
Normal Size Small Size show me how
ITN266
final
| Question | Answer |
|---|---|
| DNSSEC ________. | is still under development |
| IP addresses are 32 octets long. | False |
| The terms octet and byte mean the same thing. | True |
| TCP/IP's internet layer supervisory protocol is ________. | ICMP |
| The SNMP ________ command is very dangerous. | SET |
| A normal TCP close takes ________ segments. | 4 |
| A network that runs on the customer premises is a ________. | LAN |
| Single-network core standards are for message delivery through ________. | Both LANs and WANs |
| The subnet mask is one of the three parts of an IP address. | False |
| A TCP session opening ends with a(n) ________ message. | ACK |
| How many layers does the OSI architecture have? | 7 |
| TCP segment carries octets 5371 through 6358. What is its sequence number? | 6359 |
| At what core layer do you find WAN standards? | Single-network |
| If two hosts are separated by seven networks, how many packets will there be along the way when a host transmits a packet to another host? | 1 |
| TCP segment carries octets 5371 through 6358 The next segment carries no data. What is that segment's sequence number? | 6359 |
| Which of the following is true? | Both TCP works at the transport layer and UDP works at the transport layer |
| Packets are carried inside frames. | True |
| When your mobile phone is on a network, it is a host. | True |
| Which of the following sends passwords in the clear? | FTP |
| In e-mail, the ________ protocol is fused or downloading new mail from the recipient's mail server to the recipient's PC. | POP |
| The TCP ________ field is designed to control the other party's transmission rate. | window |
| Attackers can read signals traveling over UTP without tapping the cord. | True |
| What is the general function of the second row in the IPv4 header? | To handle fragmentation and reassembly |
| TCP segment carries octets 4321 through 4371. What will be the acknowledgement number in the TCP segment that acknowledges this segment? | 4372 |
| To get configuration information from managed devices on the network and to change the configuration of managed devices, companies use ________. | SNMP |
| If two hosts are separated by five networks, how many frames will there be along the way when a host transmits a packet to another host? | 5 |
| An abrupt TCP close takes ________ segments. | physical link |
| A computer connects to the nearest switch via a ________. | physical link |
| ________ tell the attacker that a certain IP address has a live host or router. | Both ICMP Echo replies and ICMP error messages |
| A residential access router usually contains ________. | Both a DHCP server and an Ethernet switch |
| A mask is needed to identify the size of the network part or of the combined network and subnet parts. | True |
| A ________ is likely to have the same address each time it goes on the Internet. | server |
| In DNS cache poisoning, an attacker replaces the IP address of a host name with another IP address. | True |
| The main exterior dynamic routing protocol is ________. | BGP |
| The ________ field in a packet ensures that misaddressed packets will not circulate endlessly. | TTL |
| Which of the following is an OSI standards agency? | Both ISO and ITU-T |
| A device attached to a network is called a ________. | host |
| In an IPv4 packet, the ________ field describes the contents of the packet's data field. | protocol |
| User computers connect to ________ switches. | workgroup |
| Security problems with protocols include ________. | Both a lack of security in earlier versions and awkwardly added security |
| A ________ server gives an original host the IP address of another host to which the original host wishes to send packets. | DNS |
| In ________, signals can be read without tapping the cord. | UTP |
| In internets, different networks are connected by ________. | routers |
| In the IETF, a proposed standard is called a Request for Comments. | True |
| Frames are messages traveling through ________. | WANs |
| ICMP ________. | Both is used in ping transmissions and is used for error messages |
| An abrupt TCP close takes ________ segments. | None of these. |
| Servers get ________. | static IP addresses |
| Ping sends ________ messages and receives replies in the same protocol. | ICMP |
| IPsec works with ________. | Both IPv4 and IPv6 |
| An organization with a ________ domain name must maintain one or more DNS servers. | second-level |
| The most popular way for hackers to take over hosts today is ________. | by taking over an application |
| SIP identity protocols are common on IP telephones. | True |
| VoIP security can easily be implemented even if the company's basic security is weak. | False |
| Overall for firms, which is more time consuming to patch? | Applications |
| Attacks in which a user reaches a directory outside of the WWW root directory and its subdirectories is called a(n) ________ attack. | directory traversal |
| Compared to full programming languages, scripts are ________ in what they can do. | more limited |
| Accepting cookies is necessary to use many websites. | True |
| RTP adds ________ to UDP. | sequence numbers |
| NAT adds latency to VoIP packets. | True |
| Which version of SNMP allows the manager to have a different shared secret with each agent? | Version 3 |
| SIP Identity protocols ________. | ensure that traffic is authenticated between two companies holding public/private keys |
| Which comes third in a VoIP packet? | RTP header |
| RTP is used in ________. | transport |
| Generally speaking, vendors use similar mechanisms for downloading and installing patches. | False |
| In VoIP, firewalls are a problem because they tend to ________. | increase latency |
| Cookies can used to track users at a website. | True |
| In IM, all messages pass through a ________ server. | relay |
| Transport consists of communication to manage the network. | False |
| On a compromised computer, if you mistype the name of a URL, you may be taken to a malicious website even if you set your browser security to high. | True |
| To satisfy legal retention and other compliance regulations, companies should use ________ in IM. | a relay server |
| The Skype protocol is relatively easy for corporate firewalls to filter. | False |
| DoS attacks against VoIP can be successful even if they increase latency only slightly. | True |
| Experts advise firms to turn on most or all applications and then harden them. | False |
| Operating system hardening is more total work than application hardening. | False |
| Spam over VoIP is called ________. | SPIT |
| SYN-ACK can be best described as the second part of a three-way TCP handshake sent in response to a SYN. | True |
| A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections. | SYN flood |
| Which of the following is an example of a wireless attack? | All of these |
| Wireless IDSs get their data from the company's access points. | True |
| The most common attack against a wireless network is a ________. | unauthorized network access |
| Which of the following measures offers strong security? | Neither Turning off SSID broadcasting nor MAC access control lists |
| In a man-in-the-middle attack, an evil twin sends own attacks, impersonating the victim. | True |
| Flooding the frequency of a wireless network is one method attackers use to affect the network. | True |
| ICMP can be best described as the second part of a three-way TCP handshake sent in response to a SYN. | False |
| Which of the following measures offers strong security? | None of these |
| Focusing electronic attacks on specific high-value targets is known as whaling. | True |
| ________ is the process of obscuring an attackers source IP address. | Spoofing |
| ________ are compromised hosts running malware controlled by the hacker. | Bots |
| An indirect attack occurs when an attacker tries to flood a victim with a stream of packets directly from the attacker's computer. | False |
| In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host. | False |
| Rogue access points are unauthorized access points set up by individuals or departments. | True |
| Using a shared initial key is dangerous in ________. | WEP |
| ________ is/are effective method(s) to preventing ARP poisoning attacks. | Both Static tables and Limiting local access |
| In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts. | False |
| By giving unauthorized users access to a local WLAN means that they are on the local network. | True |
| Each network interface card (NIC) has a media access control address (MAC). | True |
| A ________ is an older attack that uses an illegally large IP packet to crash an operating system. | ping of death |
| A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic. | Ping flood |
| Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address. | True |
| EAP uses RADIUS for authentication. | False |
| Like the public switched telephone network, VoIP technology is a closed system. | False |
| Scripts do not have the ability to permanently change your computer registry. | False |
| RTP stands for ________. | Real Time Protocol |
| To prevent eavesdropping, applications should ________. | use encryption for confidentiality |
| Skype can decrypt and read user traffic. | True |
| If a hacker takes over an application program, he or she receives the permissions with which the program runs. | True |
| Companies are responsible for filtering sexually or racially harassing messages and can be sued for not doing so. | True |
| Eavesdropping can be thwarted by encrypting ________. | Both signaling traffic and transport traffic |
| Baselines are used to go beyond default installation configurations for high-value targets. | True |
| SIP proxy servers are used in ________. | signaling transmissions |
| Most firms do a satisfactory job overseeing the deployment of custom programs used to supplement packaged software. | False |
| To take advantage of user typing errors, attackers register site names that are similar to those of legitimate domain names. | True |
| ________ errors may indicate that an attacker is trying to send invalid data to the server. | 500 |
| ________ is used by ________ for authentication. | ________ is used by ________ for authentication. |
| After gaining wireless access to the private network, the attach can ________. | All of these |
| EAP uses RADIUS for authentication. | False |
| An attacker controlling bots in a coordinated attack against a victim is known as a ________. | DDoS attack |
| A ________ attack is when a webserver is flooded with application layer web requests. | HTTP flood |
| Most central authentication servers are governed by the ________ standard. | RADIUS |
| A ________ is an older attack that uses an illegally large IP packet to crash an operating system. | ping of death |
| Rogue access points are unauthorized access points set up by individuals or departments. | True |
| ________ are an additional layer of compromised hosts that are used to manage large groups of bots. | Handlers |
| One problem with ARP requests and replies is that they do not require authentication of verification. | True |
| An unauthorized access point set up by individuals or departments is called a(n) ________ access point. | rogue |
| Wireless IDSs get their data from the company's access points. | true |
| The 802.1X protocol created for wired LANs can work in wireless LANs without significant modification. | false |
| In a P2P attack, there is a change in traffic pattern but the overall volume of traffic is the same. | true |
| In 802.1X, the heavy authentication work is done on ________. | Neither authenticators nor clients |
| ________ security uses 128-bit AES encryption for confidentiality and AES-CCMP for automatic rekeying. | 802.11i |
| In regards to network security, ________ means preventing unauthorized users from gaining information about the network structure, data flowing across the network, network protocols used, or packet header values. | confidentiality |
| Once established, botnets can be leased to other criminals for DoS attacks. | True |
| In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host. | false |
| Rerouting traffic using ARP poisoning is an attack on ________ of a network. | Both functionality and confidentiality |
| What standard did the 802.11 Working Group create to extend 802.1X operation to WLANs with security for EAP? | 802.11i |
| In a man-in-the-middle attack, an evil twin sends own attacks, impersonating the victim. | True |
| The most common attack against a wireless network is a ________. | unauthorized network access |
| In pre-shared key mode, a passphrase should be at least ________ characters long? | 20 |
| Encryption is heavily used in commercial e-mail. | False |
| PKI uses circles of trust. | False |
| Which of the following uses a PKI? | S/MIME |
| ________ offers no security at all. | SNMP V1 |
| Website defacement occurs when attackers take over a computer and produce false web pages. | False |