Data Networks Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

At what layer would you find packets? Question options: A) 3 B) 4 C) 1 D) 2

A) 3

Which of the following is an integer? Question options: A) 4,307 B) 45.7 C) both 4,307 and 45.7 D) neither 4,307 nor 45.7

A) 4,307

How many wires are there is a UTP Ethernet cord? Question options: A) 8 B) 2 C) 1 D) 4

A) 8

The ________ standard was created to prevent attackers from walking in and simply plugging a computer into a wall jack and therefore accessing the network. Question options: A) 802.1X B) Ethernet firewall C) 802.3X D) 802.1AE

A) 802.1X

________ is the percentage of time that a network is available for use. Question options: A) Availability B) Downtime C) QoS D) None of these

A) Availability

What type of address is 32 bits long? Question options: A) IPv4 B) IPv6 C) EUI-48 D) All of these

A) IPv4

Ethernet addresses were formerly called ________ addresses. Question options: A) MAC B) IP C) both MAC and IP D) neither MAC nor IP

A) MAC

A program that can capture passwords as you enter them is ________. Question options: A) a keystroke logger/spyware B) data mining software C) both a keystroke logger/spyware and data mining software D) neither a keystroke logger/spyware nor data mining software

A) a keystroke logger/spyware

An Ethernet switch knows ________. Question options: A) a single port number for each EUI-48 address B) the entire path from the source host to the destination host C) multiple port numbers for each EUI-48 address D) an IP address for each EUI-48 address

A) a single port number for each EUI-48 address

Network speeds usually are measured in ________. Question options: A) bits per second B) bytes per second C) both bits per second and bytes per second D) neither bits per second nor bytes per second

A) bits per second

An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.) Question options: A) defense in depth B) comprehensive security C) risk assurance D) having a DMZ

A) defense in depth

The Target attackers probably first broke into Target using the credentials of a(n) ________. Question options: A) employee in a firm outside Target B) Target IT employee C) low-level Target employee D) Target security employee

A) employee in a firm outside Target

Another term for authorization is ________. Question options: A) permission B) establishing the creator of a file C) authentication D) token

A) permission

Ethernet standards are specified at the ________ layer. Question options: A) physical B) data link C) both physical and data link D) neither physical nor data link

A) physical

A man in the middle attack ________. Question options: A) reads traffic traveling between one host to another B) creates a denial service attack on both parties C) creates a denial of service attack against the client D) None of these

A) reads traffic traveling between one host to another

UDP is ________. Question options: A) reliable B) unreliable C) It depends on the situation. D) None of these

A) reliable

Tricking users into doing something against their security interests is ________. Question options: A) social engineering B) hacking C) both social engineering and hacking D) neither social engineering nor hacking

A) social engineering

An attack aimed at a single person or a small group of individuals is a(n) ________ attack. (Choose the most specific answer.) Question options: A) spear phishing B) phishing C) highly targeted D) customized

A) spear phishing

How a message is organized is its ________. Question options: A) syntax B) protocol C) order D) semantics

A) syntax

Wireless network standards operate at ________. Question options: A) the data link layer B) the Internet layer C) both the data link layer and the Internet layer D) neither the data link layer nor the Internet layer

A) the data link layer

The general name for a security flaw in a program is a ________. Question options: A) vulnerability B) virus C) security fault D) malware

A) vulnerability

Which of the following is the newest Wi-Fi standard? Question options: A) 802.11b B) 802.11n C) 802.11ac D) 802.11g

C) 802.11ac

Internet standards are published as ________. Question options: A) RFCs B) Internet Protocols C) IETFs D) TCP/IPs

C) IETFs

Requiring someone to use a resource to prove his or her identity is ________. Question options: A) both authentication and authorization B) authorization C) authentication D) confidentiality

C) authentication

The Ethernet data field contains ________. Question options: A) a packet B) the LLC subheader C) both a packet and the LLC subheader D) neither a packet nor the LLC subheader

C) both a packet and the LLC subheader

An extended service set (ESS) is a group of BSSs that ________. Question options: A) are connected to the same distribution system B) have the same SSID C) both are connected to the same distribution system and have the same SSID D) neither are connected to the same distribution system nor have the same SSID

C) both are connected to the same distribution system and have the same SSID

802.11i provides ________. Question options: A) confidentiality B) message integrity C) both confidentiality and message integrity D) neither confidentiality nor message integrity

C) both confidentiality and message integrity

When a firewall identifies an attack packet, it ________. Question options: A) discards the packet B) copies information about the packet into a log file C) both discards the packet and copies information about the packet into a log file D) neither discards the packet nor copies information about the packet into a log file

C) both discards the packet and copies information about the packet into a log file

Momentary traffic peaks can lead to ________. Question options: A) latency B) packet loss C) both latency and packet loss D) neither latency nor packet loss

C) both latency and packet loss

Jitter is a problem for ________. Question options: A) voice over IP (VoIP) B) streaming media C) both voice over IP (VoIP) and streaming media D) neither voice over IP (VoIP) nor streaming media

C) both voice over IP (VoIP) and streaming media

The general name for evil software is ________. Question options: A) exploit B) virus C) malware D) worm

C) malware

Unsolicited commercial e-mail is better known as ________. Question options: A) identity theft B) social engineering C) spam D) adware

C) spam

What organization creates Ethernet standards? (Give the most specific answer.) Question options: A) OSI B) ISO C) IETF D) IEEE

D) IEEE

An EUI-48 address was formerly called a(n) ________ address. Question options: A) IPv6 B) IPv4 C) DNS D) MAC

D) MAC

Balancing threats against protection costs is called ________. Question options: A) economic justification B) defense in depth C) comprehensive security D) risk analysis

D) risk analysis

The messages of VPNs ________. Question options: A) are not encrypted B) are encrypted

B) are encrypted

At what layer are frames standardized? Question options: A) physical B) data link C) Internet D) All of these

B) data link

A notebook computer configured to act like a real access point is a(n) ________. Question options: A) rogue access point B) evil twin access point

B) evil twin access point

Latency is usually measured in ________. Question options: A) bits per second (bps) B) milliseconds (ms) C) minutes of downtime D) None of these

B) milliseconds (ms)

Switches make decisions based on the ________. Question options: A) destination data link layer address B) physical link address C) phase of the moon D) source data link layer address

B) physical link address

SNMP Set commands can ________. Question options: A) ask agents for information about the managed device B) reroute traffic C) both ask agents for information about the managed device and reroute traffic D) neither ask agents for information about the managed device nor reroute traffic

B) reroute traffic

An unauthorized internal access point is a(n) ________ access point. Question options: A) shadow B) rogue C) evil twin D) counterfeit

B) rogue

In QoS, the S stands for ________. Question options: A) security B) service C) software D) satisfaction

B) service

To drive around a city looking for working access points that are unprotected is ________. Question options: A) drive-by hacking B) war driving

B) war driving

Wi-Fi Standards come from the ________ Working Group. Question options: A) 802.1X B) 802.11 C) 802.3 D) 802.1

B) 802.11

What is the strongest security protocol for 802.11 today? Question options: A) 802.11s B) 802.11i C) 802.11X D) WPA

B) 802.11i

What 802 Working Group creates Ethernet standards? Question options: A) 802.1 B) 802.3 C) 802.11 D) 802.2

B) 802.3

Which of the following was created for PANs? Question options: A) 802.11 B) Bluetooth C) both 802.11 and Bluetooth D) neither 802.11 nor Bluetooth

B) Bluetooth

In LANs, ________ typically is for ________. Question options: A) optical fiber, access lines B) UTP, access lines C) UTP, trunk lines D) None of these

B) UTP, access lines

SNMP is Question options: Simple Network Management Protocol Simple Network Management Portal Simple NIC Management Protocol Small Network Management Protocol

Simple Network Management Protocol


Conjuntos de estudio relacionados

Ex3 Peds LWW Toddler Flash Cards FA20

View Set

Pharmacognosy and Plant chemistry (VIOLET)

View Set

NM422 Final Exam Practice Questions

View Set

Chapter 5: Chain Reactions, Nuclear Reactors, and Atomic Bombs

View Set

Chapter 24 Module 2: Section 24.02

View Set

chpt 6: inventory & cost of goods sold

View Set

Standard 4- Learning Environments and Instructional Practices

View Set

Global Business BA310 Chapter 4 Exam

View Set

Chapter 1: Citizenship in Our Changing Democracy

View Set

What is a Computer Vocabulary Terms

View Set

Chapter 1 - The Anthropological Perspective On The Human Condition

View Set