Chapter 10 (Test 3)
A network protocol governs how networking equipment interacts to deliver data across the network. True or False?
T
Border firewalls simply separate the protected network from the Internet. True or False?
T
Dynamic Host Configuration Protocol (DHCP) means a protocol used on IP networks to provide configuration details automatically to client computers. True or False?
T
NAC works or wired and wireless networks. True or False?
T
Telephony denial of service (TDoS) is a variation of a denial of service (DoS) attack, but is launched against traditional and packet-based telephone systems. A TDoS attack disrupts an organization's use of its telephone system through a variety of methods. True or False?
T
The OSI Reference Model is a theoretical model of networking with interchangeable layers. True or False?
T
The physical layer must translate the binary ones and zeroes of computer language into the language of the transport medium. True or False?
T
The term hactivist describes a hacker who is, or claimsto be, motivated by political or social justice concerns and uses hacking skills to reinforce his or her chosen position. True or False?
T
The traceroute commands displays the path that a particular packet follows so you can identify the source of potential network problems. True or False?
T
A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator is the definition of _____________. a. packet-filtering firewall b. stateful inspection firewall c. point-to-point tunneling protocol (PPTP) d. application proxy firewall
a
Network _________ is gathering information about a network for use in a future attack. a. reconnaissance b. eavesdropping c. denial of service d. surveying
a
What term is used to describe the current encryption standard for wireless networks? a. Wi-Fi Access (WPA) b. Wired Equivalent Privacy (WEP) c. Wireless Access Point (WAP) d. Screened subnet
a
Which of the following is the definition of network address translation (NAT)? a. A method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address b. A method to restrict access to a network based on identity or other rules c. A protocol to implement a VPN connection between two computers d. A management protocol for IP networks
a
________ is a suite of protocols designed to connect sites securely using IP networks. a. Network Access Control (NAC) b. Internet Protocol Security (IPSec) c. Dynamic Host Configuration Protocol (DHCP) d. Point-to-Point Tunneling Protocol (PPTP)
b
A __________ contains rules that define the types of traffic that can come and go through a network. a. network protocol b. switch c. firewall d. hub
c
A method to restrict access to a network based on identity or other rules is the definition of _______________. a. media access control (MAC) b. screened subnet c. network access control (NAC) d. stateful inspection firewall
c
What name is given to a protocol to implement a VPN connection between two computers? a. Internet Control Message Protocol (ICMP) b. Dynamic Host Configuration Protocol (DHCP) c. Point-to-Point Tunneling Protocol (PPTP) d. Screened subnet
c
Which OSI Reference Model layer must translate the binary ones and zeroes of computer language into the language of the transport medium? a. data link layer b. transport layer c. physical layer d. session layer
c
A _________ controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network. a. router b. switch c. hub d. firewall
d
What term is used to describe a method of IP address assignment that uses alternate, public IP address to hide a system's real IP address? a. Network Access Control (NAC) b. Application proxy firewall c. Internet Control Message Protocol (ICMP) d. Network Address Translation (NAT)
d
Which OSI Reference Model layer includes all programs on a computer that interact with the network? a. network layer b. session layer c. presentation layer d. application layer
d
Which OSI Reference Model layer is responsible for transmitting information on computers connected to the same local area network (LAN)? a. session layer b. transport layer c. presentation layer d. data link layer
d
A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator is the definition of application proxy firewall. True or False?
F
A stateful inspection firewall compares received traffic with a set of rules that define which traffic it will permit to pass through the firewall. True or False?
F
Another name for a border firewall is a DMZ firewall. True or False?
F
IPv6 addresses are 64-bit numbers. True or False?
F
Internet Control Message Protocol (ICMP) is a method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address. True or False?
F
The term screened subnet refers to a firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator. True or False?
F