CISC 5009 - HW 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Frame Relay

A PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology.

Asynchronous Transfer Mode (ATM)

A cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.

Committed Information Rate (CIR)

A guaranteed minimum transmission rate offered by the service provider

Synchronous Optical Network (SONET)

A high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links

virtual circuit

A logical sequence of connections with bandwidth allocated for a specific transmission pathway

Frame Relay

A point-to-point permanent virtual circuit (PVC) technology that offers WAN communications over a fast, reliable, digital packet-switching network

Point-to-Point Protocol (PPP)

A remote access protocol that supports many protocols and is used to carry data over a variety of network connections

Which of the following is a guideline for creating a security policy?

A security policy should be enforceable.

Which procedure specifies what resources users can access and the tasks they can perform on a network?

Authorization

A rootkit is a self-replicating program that masks itself as a valid program but is actually a type of malware.

False

A router is a CSU/DSU device. (T/F)

False

Network Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended. (T/F)

False

T-Carrier lines only require a CSU/DSU on the customer's side of the connection. (T/F)

False

You don't need to physically secure your servers as long as you use a good, strong password for your accounts.

False

Source address Protocol

Firewalls can filter packets based on which of the following? (Choose all that apply.) Source address Protocol OS Context

Which Windows domain-based protocol provides mutual authentication between devices?

Kerberos

Which protocol is used for dial-up and to create VPNs?

Point-to-Point Tunneling Protocol

Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

Preshared key

Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an essential distinction between the two technologies?

T1 uses point-to-point, while frame relay makes use of virtual circuits.

Customer Premises Equipment (CPE)

The _______________ must be able to send data in the correct format onto the connection that makes up the local loop and receives data coming from that connection.

Data Terminal Equipment (DTE)

The device that passes data from the customer LAN to the DCE, usually a router

Data Circuit-terminating Equipment (DCE)

The device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem

If the minimum password length on a Windows system is set to zero, what does that mean?

The user can use a blank password.

A honeypot is configured to entice attackers and allows administrators to get information about the attack techniques being used.

True

A security policy should clearly state the desired rules, even if they cannot be enforced. (T/F)

True

IPsec functions by making an association between two communicating devices and can use a preshared key for authentication

True

Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols. (T/F)

True

Packet-switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level. (T/F)

True

How do virtual private networks ensure privacy?

Tunneling

Intrusion Detection System (IDS)

What can be used to monitor network traffic for malicious packets and report identified security breaches to a management station?

Link Control Protocol (LCP)

What device allows you to capture packets and determine which protocols are running?

Protocol Analyzer (Sniffer)

What device allows you to capture packets and determine which protocols are running?

Time Division Multiplexing (TDM)

What is the signaling method used to allocate time slots for each channel in a T-carrier line called?

port scanner

What tool can be used to determine which TCP and UDP ports are available on a particular computer or device?

EFS BitLocker TrueCrypt

Which of the following can be used to secure data on disk drives? (Choose all that apply.) EFS VPN IPSec BitLocker TrueCrypt

Multiplexing

Which of the following combines several communication streams into a single faster communication stream?

Circuit switched VPN over POTS Packet switched

Which of the following is a common WAN connection method? (Choose all that apply.) Circuit switched Packet leased VPN over POTS Packet switched

knowledge possession inherence

Which of the following is a credential category used in multi-factor authentication? (Choose all that apply.) authority knowledge rank possession inherence

CSU/DSU Router

Which of the following is a device used to make WAN connections? (Choose all that apply.) 10BaseT hub CSU/DSU Router Switch

Kerberos Digital certificates

Which of the following is a method IPsec uses to authenticate the identity of communicating devices? (Choose all that apply.) Multishared key Kerberos PAM Digital certificates

strongest wireless encryption standard requires PMF backward compatible

Which of the following is true about WPA3? (Choose all that apply.) strongest wireless encryption standard uses TKIP requires PMF backward compatible has only the Enterprise variation

What's being protected? From whom should data be protected?

Which of the following questions must be answered before determining what level of security a network requires? (Choose all that apply.) What tools are used to attack the network? What's being protected? From whom should data be protected? How much data is on the network?

Frame relay X.25

Which of the following technologies provides permanent virtual circuits? (Choose all that apply.) PSTN Frame relay X.25 ISDN

Frame Relay

Which of the following technologies uses packet switching?

PPTP SSTP L2TP

Which of these protocols is used for VPNs? (Choose all that apply.) PPTP WEP SSTP L2TP ICMP

physical security

Which phrase from the following list best completes the next sentence? "If there is access to the equipment, there is no _________________"

Demarcation point

Which term best describes the place in a WAN connection where the customer's responsibility ends and the provider's responsibility begins?

WiMAX

Which wireless WAN technology has a standard for fixed and mobile devices?

What type of policy defines the methods involved when a user signs in to the network?

authentication

You have purchased a network-based IDS. You have been tasked with deploying the device in a location where the entire network can be protected. Where should you deploy it?

demilitarized zone

Which facet of securing access to network data makes data unusable to anyone except authorized users?

encryption

What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?

tunnel

Which of the following is NOT a guideline of a security policy?

uses legal terminology to protect the organization.


Conjuntos de estudio relacionados

Field Experiment: Research Methods

View Set

Business Comm. Ch. 11 (official)

View Set

breach of contract and remedies for breach

View Set

Comparing Fractions Vocabulary, Ordering fractions with the same denominator

View Set