Cybersecurity MIS 399 - Chapter 9 (Quiz 3)
Which term describes a network that avoids packet-looping issues through an architecture that does not have tiers? A. Flat network B. Hierarchical network C. Mixed network D. Transparent network
Flat network
Which term describes a network that lies completely inside a trusted area of a network and is under the security control of the system and network administrators? A. DMZ B. Intranet C. Extranet D. Internet
Intranet
Which statement describes a common attack mechanism implemented within the ICMP protocol? A. Sending Internet worms B. Launching denial-of-service (DoS) attacks C. Stealing passwords and credit card numbers D. Sending spam
Launching denial-of-service (DoS) attacks
Which term describes a network that is typically smaller in terms of size and geographic coverage and consists of two or more connected devices? A. Local area network B. Virtual local area network C. Wide area network D. Internal area network
Local area network
What is one benefit of Network Address Translation (NAT)? A. NAT compensates for the lack of available IP address space. B. NAT allows devices using two different protocols to communicate. C. NAT creates a DMZ. D. NAT translates MAC addresses to IP addresses.
NAT compensates for the lack of available IP address space.
Which protocol, useful for auto-configuration of networks, did IPv6 introduce? A. Network Discovery (NDP) Protocol B. Internet Control Message Protocol (ICMP) C. User Datagram Protocol (UDP) Incorrect Response D. Dynamic Host Configuration Protocol (DHCP)
Network Discovery (NDP) Protocol
Which statement describes the main difference between TCP and UDP packets? A. UDP packets are a more widely used protocol. B. TCP packets are smaller and thus more efficient to use. C. TCP packets are connection oriented, whereas UDP packets are connectionless. D. UDP is considered to be more reliable because it performs error checking.
TCP packets are connection oriented, whereas UDP packets are connectionless.
Which of the following is a valid IP address? A. 192.168.1.1.1 B. 10.266.12.13 C. 172.11.11 D. 12.12.12.12
12.12.12.12
How many bits are in an IPv6 address? A. 16 B. 32 C. 64 D. 128
128
Which term describes a protocol that is based on transferring data in fixed-size packets and the fixed packet sizes help ensure that no single data type monopolizes the available bandwidth? A. AppleTalk B. ATM C. FDDI D. Token Ring
ATM
Which term describes a network that is an extension of a selected portion of a company's intranet to external partners? A. DMZ B. Intranet C. Extranet D. Internet
Extranet
T/F? ICMP is a connection-oriented protocol.
False
T/F? TCP is a connectionless protocol.
False
T/F? The Internet is a single network.
False
Which term describes a topology where all of the network components are connected to the same cable and are often called "the backbone"? A. Star topology B. Bus topology C. Ring topology D. Hybrid topology
Bus topology
Which network address class supports 253 hosts on each network with a default subnet mask of 255.255.255.0? A. Class A B. Class B C. Class C D. Class D
Class C
T/F? DDoS mitigators must by nature exist outside the area they are protecting.
True
T/F? IPv6 complexity increases operational challenges for correct deployment.
True
What is a logical implementation of a LAN that allows computers connected to different physical networks to act and communicate as if they were on the same physical network? A. DMZ B. VLAN C. Extranet D. Tunnel
VLAN
Which term describes a logical network allowing systems on different physical networks to interact as if they were connected to the same physical network? A. Virtual local area network B. Wide area network C. Metropolitan area network D. Peer-to-peer
Virtual local area network
