Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
What is the TCP portion of a packet called?a. frame b. data c. segmentd. header
Q:
Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?a. TTL b. Fragment Offset c. ECNd. Options
Q:
Which of the following is considered a flooded broadcast IP address?a. 200.15.6.255 b. 10.255.255.255 c. 255.255.255.255d. FFFF.FFFF.FFFF
Q:
Which of the following is the broadcast address for subnet 192.168.10.32 with subnet mask 255.255.255.240a. 192.168.10.63 b. 192.168.10.47 c. 192.168.10.23d. 192.168.10.95
Q:
If you are subnetting a class B network, what subnet mask will yield 64 subnets?a. 255.255.252.0 b. 255.255.64.0 c. 255.255.224.0d. 255.255.192.0
Q:
Which of the following is NOT a reason for subnetting a network?a. controlling network traffic b. increasing network security c. planning for growthd. making larger groups of computers
Q:
Which of the following addresses is a Class B IP address?a. 126.14.1.7 b. 224.14.9.11 c. 189.77.101.6d. 211.55.119.7
Q:
How are the two parts of an IP address determined?a. network identifier b. subnet mask c. host identifierd. routing table
Q:
Which protocol is responsible for automatic assignment of IP addresses?a. DNS b. DHCP c. FTPd. SNMP
Q:
In which OSI model layer will you find the OSPF protocol?a. Application b. Session c. Transportd. Network
Q:
IPv4 and IPv6 headers are interoperable.
Q:
The TCP protocol uses a three-way handshake to create a connection.
Q:
Fragmentation of IP packets is normal and doesn"t present any networking problems.
Q:
The IP address 172.20.1.5 is a private IP address.
Q:
The Transport layer of the OSI model includes the RIP protocol.
Q:
What is virus scanning and how does it work?
Q:
Discuss defense in depth.
Q:
What are the three primary goals of information security? Describe them.
Q:
Discuss scripting and how it relates to network security.
Q:
What is malicious port scanning and how can you defend against it?
Q:
What is social engineering?
Q:
Compare and contrast virus and worm.
Q:
What is a script kiddie?
Q:
List and describe two motivations attackers have to attack a network.
Q:
a. auditing f. portb. biometrics g. RBACc. DMZ h. signaturesd. DDoS attack i. sockete. packet filters j. worm1/ An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all, and normal traffic is blocked2/ The process of recording which computers are accessing a network and whatresources are being accessed, and then recording the information in a log file3/ Signs of possible attacks that include an IP address, a port number, and thefrequency of access attempts; an IDPS uses signatures to detect possible attacks4/ An area in random access memory (RAM) reserved for the use of a program that "listens" for requests for the service it provides5/ A semitrusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN6/ A network connection consisting of a port number combined with a computer's IP address7/ An access control method that establishes organizational roles to control access to information8/ A method of authenticating a user using physical information, such as retinalscans, fingerprints, or voiceprints9/ Computer files that copy themselves repeatedly and consume disk space orother resources10/ Hardware or software tools that allow or deny packets based on specifiedcriteria, such as port, IP address, or protocol.
Q:
________________ events usually track the operations of the firewall or IDPS, making a log entry whenever it starts or shuts down.
Q:
______________________ is the capability to prevent a participant in an electronic transaction from denying that it performed an action.
Q:
A ______________ is reserved for a program that runs in the background to listen for requests for the service it offers.
Q:
______________ do not require user intervention to be launched; they are self-propagating.
Q:
__________________ are spread by several methods, including running executable code, sharing disks or memory sticks, opening e-mail attachments, and viewing infected or malicious Web pages.
Q:
With which access control method do system administrators establish what information users can share?a. discretionary access control b. mandatory access control c. administrative access controld. role-based access control
Q:
What tool do you use to secure remote access by users who utilize the Internet?a. VPN b. IDS c. DMZd. DiD
Q:
Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?a. DiD b. DMZ c. VPNd. IDPS
Q:
Which type of firewall policy calls for a firewall to deny all traffic by default?a. permissive policy b. perimeter policy c. restrictive policyd. demilitarized policy
Q:
Which of the following is NOT information that a packet filter uses to determine whether to block a packet?a. checksum b. port c. IP addressd. protocol
Q:
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?a. firewall b. recycle bin c. quarantined. demilitarized zone
Q:
In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?a. basic b. challenge/response c. biometricsd. signature
Q:
Which security layer verifies the identity of a user, service, or computer?a. authentication b. repudiation c. physical securityd. authorization
Q:
Defense in depth can best be described as which of the following?a. a firewall that protects the network and the servers b. a layered approach to security c. antivirus software and firewallsd. authentication and encryption
Q:
Which of the following is NOT one of the three primary goals of information security?a. confidentiality b. integrity c. impartialityd. availability
Q:
Why might you want your security system to provide nonrepudiation?a. to prevent a user from capturing packets and viewing sensitive information b. to prevent an unauthorized user from logging into the system c. to trace the origin of a worm spread through emaild. so a user can"t deny sending or receiving a communication
Q:
What is a VPN typically used for?a. secure remote access b. detection of security threats c. block open portsd. filter harmful scripts
Q:
What can an attacker use a port scanner to test for on a target computer?a. invalid IP addresses b. SYN flags c. open socketsd. ping floods
Q:
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?a. RPC attacks b. ICMP message abuse c. malicious port scanningd. SYN flood
Q:
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?a. malicious port scanning b. man-in-the-middle c. denial of serviced. remote procedure call
Q:
Which term is best described as an attack that relies on the gullibility of people?a. malicious code b. script kiddie c. back doord. social engineering
Q:
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?a. worm b. macro c. back doord. Trojan
Q:
What is a program that appears to do something useful but is actually malware?a. virus b. logic bomb c. Trojand. back door
Q:
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?a. botnet b. Trojan c. logic bombd. packet monkey
Q:
A hactivist can best be described as which of the following?a. an unskilled programmer that spreads malicious scripts b. consider themselves seekers of knowledge c. use DoS attacks on Web sites with which they disagreed. deface Web sites by leaving messages for their friends to read
Q:
With discretionary access control, network users can share information with other users, making it more risky than MAC.
Q:
Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.
Q:
Physical security protects a system from theft, fire, or environmental disaster.
Q:
A worm creates files that copy themselves repeatedly and consume disk space.
Q:
A packet monkey is an unskilled programmer who spreads viruses and other malicious scripts to exploit computer weaknesses.
Q:
You have been hired to design a small office network that will have 10 workstations and two servers. You want to use a network topology that is flexible for future growth and performance enhancements. Which topology should you choose?a. ring b. star c. busd. mesh
Q:
Which of the following accurately describes a function of a LAN?a. offers networking services over a long distance b. connects office networks in two different cities c. uses a modem to connect to an ISPd. uses switches to connect computers
Q:
Which of the following is NOT a typical function of a client operating system?a. enables a workstation to run applications b. processes information locally c. authenticates clients to access the networkd. communicates with other computers over the network
Q:
TCP establishes communication sessions among applications on two communicating computers.
Q:
The transmission control method used by Ethernet is called collision sense multiple access with carrier detection (CSMA/CD)..
Q:
A large file is broken into hundreds of small data units called packets and each data unit is transmitted across the network.
Q:
LANs often connect WANs over a long distance such as between cities, states, or countries.
Q:
A client OS coordinates network activities, authenticates users to access the network and enables workstations to access shared network resources.
Q:
What is the difference between ADSL and SDSL?
Q:
Name two enhancements of DOCSIS 3.0 over non-DOCSIS compliant cable modems?
Q:
What are the two interfaces supported in ISDN and what are their respective data rates?
Q:
What command would you send a Hayes compatible modem if you wanted the modem to ignore incoming calls?
Q:
What is a winmodem and what is a disadvantage of using one?
Q:
What type of signal is embedded in the data of synchronous communication lines?
Q:
Briefly describe the role of the UART in a modem.
Q:
What task does the controller component in a modem perform?
Q:
Briefly describe what a modem does.
Q:
a. flow control f. protocolb. cable modem g. ADSLc. synchronous communication h. Xon-Xoffd. data pump i. modeme. daemon j. asynchronous communication1/ a high speed technology that can use ordinary telephone lines for downstream transmissions speeds up to 8 Mbps and upstream speeds up to 1 Mbps2/ the hardware or software portion of a modem that is responsible for converting digital data into analog signals for transmission over a telephone line3/ a hardware or software feature in modems that lets a receiving modem communicate to the sending modem that it needs more time to process previously sent data4/ an internal, automatically running program, usually in UNIX/Linux, that serves a particular function such as routing e-mail to recipients5/ a hardware device that permits a computer to exchange digital data with another computer via an analog telephone line or dedicated connection6/ communications that occur in discrete units in which the start of a unit is signaled by a start bit at the front, and a stop bit at the back signals the end of the unit7/ communications of continuous bursts or blocks of data controlled by a clock signal that starts each burst or block of data8/ a software flow control protocol that permits a receiving modem to notify the sending modem that its data buffers are full9/ an established guideline that specifies how networked data, including data sent over a telephone network, is formatted into a transmission unit10/ a digital modem device designed for use with the cable TV system providing high-speed data transfer.
Q:
___________ checking is a data verification process that ensures data integrity through a system of data bit comparisons between the sending and receiving computer.
Q:
____________ uses digital communications over a communications line and has an aggregate data rate of 144 Kbps or 1.544 Mbps
Q:
The _______ is a component of a modem that reads in one byte of data, adds a start and stop bit and feeds the bits to the port.
Q:
A desktop computer with a modem is called a ________ device because it prepares data to be transmitted.
Q:
Computers store data as a series of 1s and 0s represented by the presence or absence of _________.
Q:
What protocol does a dial-up networking connection use to access the ISP for Internet communications?a. ISDN b. UART c. PPPd. DOCSIS
Q:
When connecting to an analog modem using Windows XP, which of the following is a possible port name through which you communicate to the modem?a. COM2 b. TTY0 c. LPT1d. UART0