Module 3 - Information Security Basics - AWR-173-W

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is Instant Messaging? Select one: a. A form of online communication in which two parties exchange messages in real time b. A VoIP feature-set c. Slang-term for a network layer protocol d. None of the above

a. A form of online communication in which two parties exchange messages in real time

Which of the following are layers of the TCP/IP stack? Select all that apply. Select one or more: a. Application b. Transport c. Physical d. Information

a. Application b. Transport c. Physical

Of the 8 verbs in HTTP communication, which two are used the most often? Select one: a. GET and POST b. PUT and CONNECT c. GET and PUT d. CONNECT and GET

a. GET and POST

Which of the following are layers of the TCP/IP stack? Select all that apply. Select one or more: a. Transport b. Application c. Physical d. Information

a. Transport b. Application c. Physical

Which of the following is a common data link layer protocol? a. Token ring b. Ethernet c. Wi-Fi 802.11 d. All of the above

b. All of the above

Why are organizations beginning to use IPv6? Select one: a. IPv6 is faster than IPv4 b. The IANA (Internet Assigned Numbers Authority) is quickly running out of IPv4 addresses c. The United Nations has mandated that the Internet switch from IPv4 to IPv6 d. IPv4 networks are too often targeted by spammers and attackers. This is not a problem on IPv6 networks.

b. The IANA (Internet Assigned Numbers Authority) is quickly running out of IPv4 addresses

One of the main responsibilities of TCP is error-checking. TCP accomplishes this through the use of: Select one: a. A hash b. A digital signature c. A checksum d. None of the above

c. A checksum

What is the single largest complaint made about FTP? a. It is slow b. It is an old technology c. It poses a security risk d. People don't complain about FTP

c. It poses a security risk

A network architecture like the one used by the TCP/IP model, in which layers are able to be ignorant of the internal workings of other layers, is commonly referred to as: Select one: a. Streamlined b. Optimized c. Layered d. Compiled

c. Layered

What is the Domain Name System? Select one: a. A system that translates domain names, such as www.google.com, into IP addresses. b. A system that allows destinations—the hostnames—on the Internet to remain accessible by any computer, independent of how communications to and from those destinations are routed c. A system that maps hostnames and domain names to IP addresses and address ranges, and distributes the responsibility for mapping these addresses to authoritative servers of each domain d. All of the above

d. All of the above

The Transport Layer in the TCP/IP stack is mainly concerned with: a. The addressing scheme that allows systems to uniquely identify themselves b. Directing systems on how to transmit particular pieces of information that are addressed to other remote computers c. The communication between individual applications d. Ensuring that no individual portions of information were lost, discarded or corrupted during transmission from sender to recipient

d. Ensuring that no individual portions of information were lost, discarded or corrupted during transmission from sender to recipient

The Internet Protocol (IP) assigns each system that is connected to the Internet a unique number called a(n): Select one: a. MAC Address b. A single 64-bit number c. SS7 Number d. IP Address

d. IP Address

On what layer of the TCP/IP stack does the IP protocol reside? Select one: a. Physical b. Application c. Data-Link d. Network

d. Network

In regard to FTP, which of the following is true? Select one: a. Files are encrypted prior to transmission over the network b. FTP has built-in error detection layered on top of TCP's c. The username and password is encrypted prior to transmission over the network d. None of the above

d. None of the above

The Transport Layer in the TCP/IP stack is mainly concerned with: Select one: a. Ensuring that no individual portions of information were lost, discarded or corrupted during transmission from sender to recipient b. The addressing scheme that allows systems to uniquely identify themselves c. The communication between individual applications d. Directing systems on how to transmit particular pieces of information that are addressed to other remote computers

a. Ensuring that no individual portions of information were lost, discarded or corrupted during transmission from sender to recipient

In the context of networks, layered architecture is advantageous because: Select one: a. It allows one layer to be ignorant of the tasks and obligations of another layer, so that the internal workings of one layer can be modified without affecting any of the others b. It requires every layer to be knowledgeable of the tasks and obligations of each layer c. Layered architectures are faster d. Layered architectures are more secure

a. It allows one layer to be ignorant of the tasks and obligations of another layer, so that the internal workings of one layer can be modified without affecting any of the others

SSH has not completely replaced Telnet because: Select one: a. Legacy environments have services that depend on Telnet for proper operation b. SSH clients are not widely available for Windows c. SSH does not offer any major advantages over Telnet d. SSH and Telnet offer different functionality

a. Legacy environments have services that depend on Telnet for proper operation

What is one of the benefits of Universal Datagram Protocol (UDP)? a. UDP requires less overhead than TCP b. UDP is more reliable than TCP c. Since UDP provides all of the same services as TCP, its only benefits are more efficiency and less overhead d. None of the above

a. UDP requires less overhead than TCP

What is Port Address Translation (PAT)? Select one: a. A type of routing protocol used by some routers on the Internet. b. A networking scheme that allows multiple computers to simultaneously share a single IP address. c. A scheme that allows systems to look up the proper TCP port number for well-known services like HTTP and DNS. d. A networking scheme that allows a pool of computers to share a smaller pool of IP addresses.

b. A networking scheme that allows multiple computers to simultaneously share a single IP address.

Skype provides for the security of users' instant messaging, voice, and video communications by: Select one or more: a. Skype does not provide any security measures b. Acting as a certificate authority and issuing digital certificates to all users c. Encrypting all communications d. Changing firewall settings on the user's computer

b. Acting as a certificate authority and issuing digital certificates to all users c. Encrypting all communications

Currently, the most frequently observed link layer protocol is: Select one: a. Token ring b. Ethernet c. Wi-Fi 802.11b d. WiMax 802.16

b. Ethernet

The Internet Protocol (IP) assigns each system that is connected to the Internet a unique number called a(n): Select one: a. SS7 Number b. IP Address c. MAC Address d. A single 64-bit number

b. IP Address

How is the Domain Name System "redundant?" a. The Domain Name System is well fortified and backed up regularly b. If a DNS server goes down, the DNS master system automatically assigns a hot-spare to handle its queries c. Each top-level domain (.com, .org, .net, etc) has multiple redundant servers that can respond to requests. d. All of the above

b. If a DNS server goes down, the DNS master system automatically assigns a hot-spare to handle its queries

In the context of networks, layered architecture is advantageous because: Select one: a. Layered architectures are more secure b. It allows one layer to be ignorant of the tasks and obligations of another layer, so that the internal workings of one layer can be modified without affecting any of the others c. It requires every layer to be knowledgeable of the tasks and obligations of each layer d. Layered architectures are faster

b. It allows one layer to be ignorant of the tasks and obligations of another layer, so that the internal workings of one layer can be modified without affecting any of the others

A network architecture like the one used by the TCP/IP model, in which layers are able to be ignorant of the internal workings of other layers, is commonly referred to as: Select one: a. Streamlined b. Layered c. Optimized d. Compiled

b. Layered

Which of the following are protocols used to retrieve stored email from a mail server? Select one: a. POP and SNMP b. POP and IMAP c. MIME and IMAP d. TCP and UDP

b. POP and IMAP

Which of the following is not the concern of TCP? Select one: a. Reliable delivery of information b. Selecting the route for the information to take across the internet c. Preventing congestion on the network d. Reconstructing data that was received out of order

b. Selecting the route for the information to take across the internet

What type of encryption algorithm is used in HTTPS? Select one: a. Asymmetric Key Encryption b. Symmetric Key Encryption c. HTTPS does not use encryption d. None of the above

b. Symmetric Key Encryption

What is Port Address Translation (PAT)? Select one: a. A type of routing protocol used by some routers on the Internet. b. A scheme that allows systems to look up the proper TCP port number for well-known services like HTTP and DNS. c. A networking scheme that allows multiple computers to simultaneously share a single IP address. d. A networking scheme that allows a pool of computers to share a smaller pool of IP addresses.

c. A networking scheme that allows multiple computers to simultaneously share a single IP address.

IPv4 is currently going through 'IP address starvation,' which means that IP addresses are running out. To remedy this issue, IPv6 will be able to offer: a. Twice as many addresses as IPv4 b. Three times as many addresses as IPv4 c. About 3.4 * 10^38 IP addresses for each of the 6.5 billion people in earth d. None of the above

c. About 3.4 * 10^38 IP addresses for each of the 6.5 billion people in earth

How does PAT enable multiple systems to simultaneously share an Internet connection? Select one: a. PAT dynamically requests additional IP addresses from the ISP (Internet Service Provider) as needed. b. PAT does not allow multiple systems to share a single Internet connection. c. PAT keeps track of the private IP address of every computer on the private (i.e. internal) network and maps them to specific ports. d. All of the above

c. PAT keeps track of the private IP address of every computer on the private (i.e. internal) network and maps them to specific ports.

What is the difference between SMTP and IMAP/POP? Select one: a. SMTP is for transferring multimedia files; IMAP and POP are for transferring text information. b. IMAP, POP, and SMTP all do the same thing c. SMTP is for transferring mail between servers; IMAP and POP are for retrieving mail from a user's mailbox d. IMAP/POP are for transferring mail between servers; SMTP is for retrieving mail from a mailbox on a local mail server

c. SMTP is for transferring mail between servers; IMAP and POP are for retrieving mail from a user's mailbox

What is the difference between SMTP and IMAP/POP? Select one: a. SMTP is for transferring multimedia files; IMAP and POP are for transferring text information. b. IMAP/POP are for transferring mail between servers; SMTP is for retrieving mail from a mailbox on a local mail server c. SMTP is for transferring mail between servers; IMAP and POP are for retrieving mail from a user's mailbox d. IMAP, POP, and SMTP all do the same thing

c. SMTP is for transferring mail between servers; IMAP and POP are for retrieving mail from a user's mailbox

What is the difference between TCP and UDP? Select one: a. UDP is more reliable than TCP b. TCP is faster than UDP c. TCP provides a reliable connection, while UDP provides a fast data delivery service d. None of the above

c. TCP provides a reliable connection, while UDP provides a fast data delivery service

What is IPv6? Select one: a. The most used form of IP protocol. b. A newer version of the IP protocol that has been proposed, but is currently still in the theoretical stage. c. The newest generation of the IP protocol d. None of the above.

c. The newest generation of the IP protocol

What is the main purpose of an ACK? Select one: a. To confirm the receipt of a segment with an especially large payload b. To confirm the receipt of a close-connection signal sent by the other party in a TCP connection c. To confirm the receipt of data and/or information from the other party in a TCP communication. d. To confirm the receipt of an "open connection" request in a TCP connection

c. To confirm the receipt of data and/or information from the other party in a TCP communication.

The data link layer uses large portions of data, called , and transmits them over the layer. Select one: a. folders, physical b. folders, transport c. frames, physical d. packets, network

c. frames, physical

Network Address Translation (NAT) allows many systems to share what? Select one: a. A single internet connection b. A collection of subnets c. A single subnet d. A small pool of global (public) IP addresses

d. A small pool of global (public) IP addresses

In regard to Port Address Translation, which of the following is true? Select one: a. Typically, computers on the inside network know the public IP address being shared by the PAT device b. Typically, the external client (i.e., the remote system being communicated with) is not aware of the public IP address for the Port Address Translation device and the port being used c. Typically, the Port Address Translation device has only a public IP address d. None of the above

d. None of the above

What does the HTTP protocol do? a. Performs domain name to IP address translations (i.e., converts webpage names into their corresponding IP addresses). b. Transfers e-mail messages between mail servers. c. Downloads e-mail from a mail server to be read by the recipient (on the recipient's computer). d. Transfers webpages from the server to the client (the person trying to view the page).

d. Transfers webpages from the server to the client (the person trying to view the page).


Kaugnay na mga set ng pag-aaral

Intro to stats: Module 4, Examining Distributions Checkpoint 1

View Set

Learning and Memory Actual Questions from Test

View Set

User-Experience Research Methods

View Set

Chapter 5 workbook-Infection Prevention and Control

View Set

Unit 2: Wars of Catholic Spain-The Netherlands and England

View Set