ISEC Final ch.10

¡Supera tus tareas y exámenes ahora con Quizwiz!

True

True or False: A subnet mask of a network is based on IP address?

captive portal

A captive portal is a webpage that is displayed for all new connections to provide a logon page for your wireless network.

LAN (Local Area Network)

A collection of computers that are connected to one another or to a common medium. All computers are generally within an area no larger than a building.

router

A device that connects two or more networks and selectively interchanges packets of data based on predetermined routes or path determinations.

screened subnet

A firewall device that has 3 NICs. One NIC connects to the internet, the second connects to the internal network, and the third connects to a DMZ

packet-filtering firewall

A firewall that examines each packet it receives and compares that packet to a list of rules. Has no memory of packets.

stateful inspection firewall

A firewall that examines the state of a connection as well as a simple address, port, and protocol rules to determine how to process a packet.

media access control address (MAC)

A hardware address that uniquely identifies each node of a network.

ICMP (Internet Control Message Protocol)

A management protocol for IP networks

NAT

A method of IP address to hide a system's actual, internal IP address.

firewall

A program or dedicated hardware device that inspects network traffic passing through it and denies or permits that traffic based on a set of rules you determine at configuration.

PPTP

A protocol to implement a VPN connection between two computers.

Fibre channel

A storage networking protocol originally used in supercomputers to connect storage devices.

unified threat management (UTM)

Devices used to provide filtering, plus many additional security services.

1 .WiFi (CORRECT) 2. 4G 3. 3G 4. Digital Subscriber Line (DSL)1.

Gary is configuring a Smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity?

443 HTTP over SSL

Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication?

presentation layer

On the OSI reference model: Data format; encryption

transport layer

On the OSI reference model: End-to-end communication maintenance

data link layer

On the OSI reference model: Physical addressing; LAN delivery

Session layer

On the OSI reference model: Process-to-process communication

network layer

On the OSI reference model: Routing data; logical addressing; WAN delivery

application layer

On the OSI reference model: User interface

IPSec

Protects IP packets from disclosure or change.

Firewall (CORRECT) Hub Switch Router

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?

NIC

This is the physical interface between a computer and the ethernet LAN. It contains a unique 6-byte MAC-layer address.

True

True or False: A network attacker wants to know IP addresses used on a network, remote access procedures, and weaknesses in network systems.

False: Stateful Inspection

True or False: A packet-filtering firewall remembers information about the status of a network communication.

False: NAT

True or False: ICMP is a method of IP address assignment that uses an alternate, public IP address to hide systems real IP address?

False: 32 or 128 bits

True or False: IP addresses are eight-byte addresses that uniquely identify every device on the network.

False: Loop protection

True or False: Implicit deny is when a firewall looks at message address to determine whether a message is being sent around an unending loop?

False: Session Layer

True or False: The Transport Layer of OSL Reference Model creates, maintain, and disconnect communication that take place between processes over the network.

True

True or False: The physical layer of OSI model translates the binary one and zeros of computer language to the language of the transport medium?

True

True or False: The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

Virtual LAN(VLAN)

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?

DHCP

What protocol is responsible for assigning IP addresses to hosts on most networks?

True

True or False: The three main categories of network security risk are reconnaissance, eavesdropping and denial of service

1. Wireless network access (CORRECT) 2. Content inspection 3. Malware inspection 4. URL filtering

What is NOT a service commonly offered by unified threat management(UTM) devices?

VLAN

A method of encrypting IP packets from one end to another. As in a tunnel.

NAC

A method to restrict access to a network based on identity or other rules.

smurf attack

A network attack in which forged ICMP echo request packets are sent to UP brodcast addresses from remote locations to generate DoS attacks.

OSI model

An internationally accepted framework of standards that govern how separate computer systems communicate using networks.

Packet filtering firewall

What type of firewall has no memory of packets it has encountered in the past and must make decisions for each packet it receives?

Physical Data Link Network Transport Session Presentation Application

What are the 7 layers?

Simple Mail Transfer Protocol

What does SMTP stand for?

switch

A network device that connects network segments, creating a direct connection between a sending and receiving port.

hub

A network device that connects network segments, echoing all received traffic to all other ports.

DHCP (Dynamic Host Configuration Protocol)

Allows each computer to get its configuration information dynamically from the network instead of the network administrator providing the configuration information to the computer.

application proxy firewall

An advanced firewall that process all traffic between two systems. Instead of allowing a direct connection between two systems, the proxy connects to each system separately and passes filtered traffic to the destination based on filtering rules.


Conjuntos de estudio relacionados

UNIT 12- Civil Rights Movement, 1960s, & the Vietnam War Ch. 25,26,27

View Set

Liste de pays et capitales pour géo

View Set

Skin Integrity and Wound Care PREPU

View Set

作文好词好句 高兴 & 生气

View Set

BGEN 360-700 International Business Chapter 3

View Set

Lecture 169 Spondyloarthropathies: Ankylosing Spondylitis, Psoriatic Arthritis, Reactive/Enteropathic Arthritis and HLA-B27......and Adult Still's Disease

View Set