CDS 424 Midterm - In Class Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What OSI model layer deals with frames?

Data Link

The bus topology has and idependent cable to each device on a network (T/F)

False

Wireless networks are more secure than wired networks (T/F)

False

Devaki is an engineer who is designing network security for her company's infrastructure. She is incorporating protections for programming flaws, default settings, maximum values, processing capabilities, and memory capacities on devices, as well as malicious code and social engineering. What is this type of protection called?

Defense in depth

Recreational hackers are criminals whose sole career objective is to compromise IT infrastructures (T/F)

False

Which form of firewall filtering is NOT as clear or distinct as other types?

Filtering on whether an address is real or spoofed.

Marcus is studying networking with an emphasis on cybersecurity at a local university. As part of his research, he wants to visit certain hacker sites but is concerned that his laptop would be vulnerable to passive threats while visiting them. He doesn't have the funds for expensive security equipment. What is the least expensive option he has at hand?

Native firewall

A hacker is attempting to access a company router useing flase ICMP type 5 redirect mesages. What is the hacker's goal?

To spoof or manipulate routing data

Rachel is a network technician. She is writing a proposal that recommends which firewall type to purchase to replace an aging and failing unit. She wants to be able to protect two separate internal network segments with one hardware firewall. What is her recommendation?

Triple-homed

A firewall serves as a clear and distinct boundary between one network area and another (T/F)

True

RFC 1918 addresses are for use only in private networks (T/F)

True

A combination of intrusion detection and prevention, as well as logging and monitoring, provides the best defense against what kind of attack?

Zero-day exploit

To secure the System/Application Domain of an IT infrastructure, what is the primary focus?

With servers & vSystems, defend both data & server computing power

Which of the following must be done first to acomplish an organization's security goals?

Write down security goals

A first-year student in a computer networking class is studying different addressing types and attempting to identify them. Which of the following does she determine is a Media Access Control (MAC) address?

00-14-22-01-23-45

Thirty years ago, a major corporation purchased and still owns IP addresses within the IPv4 Class A range. The coporation uses the addresses to connect to the internet. To which IPv4 address range do they belong?

1.0.0.1 to 126.255.255.254

When setting up port forwarding on an external firewall to pass HTTP traffic from the Internet to an internal web server, the external address and port are 208.40.235.38:8081. What is the internal IP address and port, assuming the most common port for that protocol?

192.168.5.74:80

While the design of a hardware firewall requires it to filter all inbound and outbound traffic, it can also act as a bottleneck for that traffic if the wire speed it filters at is too slow. For a 1 gigabits per second (Gbps) network, what filtering wire speed should the firewall possess?

2.5 Gbps or higher

Tonya is a student. She is working through a network addressing scheme example for a class. She has read that 128-bit address 2001:0f58:0000:0000:0000:0000:1986:62af can be shortened but is trying to understand how. What is the correct solution?

2001:0f58::1986:62af

Which network device concentrates communications signals, accepts only basic commands, and provides statistics?

Active hub

Estefan is a network professional for an e-commerce company. The chief information officer (CIO) wants the customer web portal downtime to be reduced from 5 minutes per year to 30 seconds per year. The change should occur over the next 6 months. Which security objective must Estefan employ to accomplish this goal?

Availability

Charles is an IT help desk technician. He gets a ticket from a branch office saying that they lost Internet connectivity. He investigates remotely over a backup maintenance link and determines that this was done by design; the office's firewall deliberately severed the connection. Which is the following does this functionality define?

Bastion host

You are setting up a small home network. You want all devices to communicate with each other. You assign IPv4 addresses between 192.168.0.1 and 192.168.0.6 to the devices. What processes must still be configured so that these nodes can communicate with the internet?

Both NAT and PAT to allow private to public translations.

Isaac is designing a network infrastructure as a class project. He determines that one device he requires must have the capacity to act as a repeater, operate at the Data Link Layer of the OSI model, be able to filter packets based on their MAC address, and allow communication between two local area networks (LANs). Which device will fulfill these specficiations?

Bridge

A bank's online infrastructure has been under attack by hackers. In addition to standard security methods, the bank's IT security manager has requested website code to be examined and modified, where necessary, to address possible arbitrary code execution. What will the code modifications prevent?

Buffer overflows

Augustine is a network engineer for a mid-sized company. He needs to deploy a new firewall, which was expensive to purchase and is complex to configure. In preparation for installation and configuration, he attends training conducted by the firewall vendor. Which of the following types of firewalls is he most likely planning to install?

Commercial

Rupesh is a network technician who has been tasked by his supervisor to configure the dge firewall of an office branch. His task is to focus on outbound traffic based on several factors, such as domain name, URL, file extension, and certain keywords. What is he configuring the firewall to perform?

Content filtering

Temika is the IT security officer for her company. She is defeloping a plan to measure the effectiveness of the organization's network security. Which of the following will accomplish that goal?

Continually improving the state of security so it's better protected in the future.

Which form of attack is decribed as throttling the bandwith consumption of an Internet link at specific interval as a method of transmitting small communication streams such as user credentials?

Covert channels

A malicious person has installed ransomware on a company user's computer. The ransomware message states that the malicious software will be removed if the user pays a certain amount of money digitally. What is a typical form of payment?

Cryptocurrency

The network engineer of a mid-size company needs to have all servers, network printers, and other online resources possess the same IPv6 address over time. The engineer does not want to perform manual addres assignments on all of these resources. Additionally she wants to prevent any rogue device from having an IPv4 address dynamically assigned just by making the request. What is her solution?

DHCP reservation

Shamika is a networking student who has just moved into a small house with two other roomates. She has purchased a new DSL modem and is planning on configuring the built-in firewall. She needs to change the default username and password for the device first. What is her concern?

Default username/password are likely available on the Internet

What prevents firewall filtering?

Encryption

Mario is the network security engineer for his company. He discovered that, periodically, a remote user working from home accesses certain resources on the network that are not part of her regular duties. Mario has questioned the user and her supervisor, and has accessed the user's workstation. Mario believes the user is not the source of these intrusions and strongly suspects a malicious source is responsible. What is the most likely explanation?

External hacker gained access to user's authentication to see resources

A backdoor acts like a device driver, positioning itself between the kernel and the hardware (T/F)

False

A software firewall can protect multiple hosts from malicious network activity (T/F)

False

Bump-in-the-wire is a software firewall implementation

False

Eavesdropping occurs over wireless connections, not wired connections (T/F)

False

A networking instructor is demonstrating the use of a device, that when making a connection to the Internet, issues a series of alternating tones, and is used to translate the digital signals from computers to the analog signals used on traditional telephone lines. Although the name is familiar to the students, this particular device is no longer in common use. What is the instructor demonstrating?

Modem

The chief information officer (CIO) of a large company has been informed by the coard of directors that their corporation is anticipating rapid growth over the next two years. She calculates the contingency of building additional capacity into the current network infrastructure. Based on the board's growth estimates, what percentage of additional capacity should she plan for?

More than 50 percent

An IT infrastructure manager is reviewing his company's computer assets, particularly the mean time to failure (MTTF) of the PC and server hard drives. The manufacturer or the hard drives typically used in the company states the the MTTF is approximately 11 years. Because servers and some high-priority workstations must operate continuously except for brief periods of maintenance, how many hours, on average, can these hard drives be expected to operate before failure?

More than 90,000 hours

Which type of boundary netowrk creates a series of subnets seperated by firewalls?

N-tier

Jae is a network consultant hired by a small business client. He has been asked to recommend a firewall solution. Given the relatively small size of the infrastructure, he suggest a firewall that provides integrated intrusion detection system/intrusion prevention system (IDS/IPS) functionality because a single device offering multiple funcitons is cost and space effective. What is the solution?

Next-generation firewall (NGFW)

Eduardo is configuring a system that allows multiple users working from home to connect to the office network over a wide area network (WAN) link. The platform is required to accept inbound connections from those user computers, allowing the clients to interact with the network is as if they were locally conneceted. What is he working on?

Remote access server (RAS)

The chief information officer (CIO) is working with the chief financial officer (CFO) on next year's budget for new networking equipment. The CIO is explaining the lowest-cost equipment is not the sole deciding factor. The hardware must conform to high security standards to prevent a malicious person from hacking into the network and accessing valuable company data. Which of the following considerations does not specifically require a hacker to have physical access to the equipment?

Remote connection

A company has discovered that confidential business information has been repeatedly acquired by a competitor over the past six months. The IT security team has been unable to find the leaks. The team suspects a form of side-channel eavesdropping may be involved. What is the suspected hacking method?

The competitior is using a phreaking attack.

Nahla is a network engineer charged with maintaining the routine operations of equipment in her company's server room. She is aware that the fluctuations in electrical power flow can damage delicate circutry. While configuring redundancy into a number of systems, which component does she choose that offers bothr edundance and power conditioning?

Uninterruptable power supply (UPS)

Dhruv is the lead network engineer for his three-year-old company. He is writing a proposal that recommends the network protocol to use in several branch offices. Based on the age of the networking equipment, what is his recommendation to the chief information officer (CIO)?

Upgrade to IPv6

Mohammad is presenting IPv6 cryptographic security features to his netoworking class. A student asks him to explain data origin authentication. How does he answer this question?

Uses checksum with share encryption key for verifying apparent sender

Norman is a network engineer. He is creating a series of logical networks based on different departments for a new branch office. Although the physical locations of the comptuers for a particular department may be in different areas or on different floors of the building, they have to operate as if they are on a single physical network. Norman's solution involves putting the accounting, engineering, and marketing computer nodes on different subnets. What sort of network topology does Norman create?

VLAN

Santiago is a new network engineer for a mid-sized company. It is his responsibility to ensure that all employees working from home are able to connect to the office network in anefficient and secure manner. He must provide a service that allows communications between out-of-office staff and network resources to be encrypted at the protocol level and to be performed by either client or server software. The solution must also ensure that even if protocol encryption fails, the data is safe by its own encryption. What solution does he select?

VPN

Many company employees work from home on a full-time basis. What technology do they commonly use to communicate securely with the organization's network?

Virtual private network (VPN)

Whitelisting blocks the execution of any program not on the approved list (T/F)

True

Wired topologies have a physical wire between devices, allowing for communication among those devices (T/F)

True

Zer-day exploits are new and previously unknown attacks for which no current specific defenses exist (T/F)

True

Which of the following is described as confidence in your expectation that others will act in your best interest?

Trust

Which of the following is a feature of NTFS that allows complete additional files to successfully hide beneath any normal file object and be almost undetectable?

Alternate Data Stream (ADS)

Removing unnecessary protocols/applications/services and installing latest releases are part of which security process?

Hardening

Which of the following is considered a node?

Networked printer

The IT security officer for a large company has spend the past year upgrading security for the corporate network. Employees working from home have personal firewalls running on their computers. They use a virtual private network (VPN) to connect to the corporate netowork. THe corporate network utilizes the latest devices and techniques, including an intrusion detection system/intrusion prevention system (IDS/IPS), anti-malware protection, and firewalls. What security threat most likely still needs to be addressed?

An internal threat, such as disgruntled employee or contractor

In executing the processes of risk assessment and risk managment, which statistic calculates the potential number of times the threat could be a realized attack in a year's time?

Annualized rate of occurrence

Although it is not recommended, a company chief information officer (CIO) wants to configure and use the ff02::1 group on his new IPv6 network to send traffic to every node in the infrastructure. What group must he enable?

Anycast

In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation, what is the more likely range involved?

Less that 1,000 feet

You are a network professional. You want to overcome security shortcomings of the Domain Name System (DNS) and protect the IP address locations of sensitive resources on the internal network. What alternative can you use?

HOSTS file

A major social networking site has been hacked. The usernames, passwords, and security questions of more than 500 milliion users were compromised. The company disclosed the breach to all users, advising them to immediately change their passwords and security questions. The vulnerability that lead to the breach has been discovered and patched. However, the security engineer suspects there is still a problem left unadressed. What is most likely the problem?

Hackers may have left malicious tool in network that allow continued access

A chief financial officer's (CFO's) business account has been leaked onto the Internet, including the CFO's username, password, and financial data. The firm's security manager scanned the CFO's comptuer for viruses, which was clean. However, the manager is still conviced that the CFO's computer is somehow compromised, allowing what is typed to be disclosed. The manager recalls that six weeks ago, the CFO's assistant was caught illicity accessing secure financial files and was subseqently dismissed. What is the likely problem?

Hardware keystroke logger

A chief information officer (CIO) works for a mid-sized company located on the California coast. The CIO is developing a disaster plan for the IT infrastructure in the event of an earthquake powerful enough to damage or destroy network and computing equipment, including the database servers. What can she do to protect valuable company data even under the worst circumstances?

Have data regularly backed up and stored in secure, off-site facility

Hao is a network security engineer for a mid-sized company. She is redesigning the infrastructure and its resources to provide greater protection from both external and internal threats. She wants to place firewall devices not only where the local area network (LAN) connects to the Internet, but also within the network. Although she doesn't suspect any employees of misusing computer resources, there is always the potential that one might send unauthorized emails or other messages containing confidential company information to a competitor. Which redundant solution should she select that will be most likely to detect malicious behavior by an internal employee?

Host firewalls and firewalls at each subnet

Which form of addressing uses 32 bits and subnetting, but suffers from a lack of integrated security?

IPv4

Which fragmentation attack results in full or partial overwriting of datagram components?

Overlap

A firewall is a filtering device that watches for traffic that fails to comply with rules defined by the firewall administrator. What does the firewall inspect?

Packet header

Which of the following is a security feature every end-user client computer needs?

Password-protected screen saver

Geraldine is a freelance network technician. She has been hired to design and build a small office/home office (SOHO) network. She is considering what firewall solution to select, keeping in mind that her client has a tight budget and the network is made up of no more than six nodes. Which of the following is the best solution?

Personal hardware firewall integrated in thje wireless access point or modem

A major U.S. online retailer has discovered that thousands of purchases have been paid for by stolen credit card numbers. An inital analysis of the location of the buyers reveals IP addresses from within the United States. Upon further investigation, it is found that the actual origin point of the fradulent buyer is a series of IP addresses located in Asia. What technology is the fraudster using?

Proxy server

Infomation leakage often stems from malicious employees (T/F)

True

Fatima has been hired as a contractor to decomission a network topology that has been employed by a small company since the 1990s. In studying the project specifications, she reads that this physical topology uses a special packet called tokens, and can be unidirectional or bidirectional. Although it has fewer collisions than other types of networks, this topology is rarely seen in the twenty-first century. Baffles as to what type of network this is, she goes on the Internet and researches the technology/ What sort of topology does she find?

Ring

Which type of hackers often lack the knowledge or motivation to write their own malicious code, depend on programs written by others to use in their attacks, and may not understand the full consequences of their actions?

Script kiddies

Logan is a network administrator. He is considering a firewall purchase for a branch office being built by his company. Above all other considerations, the design requires a device capable of a high degree of imposing user access restrictions. What is this called?

Security assurance

Manuela has researched a third-party software firewall she wants to install on her PC since she believes it is a better quality than the operating system's onboard firewall. She has read the installation instructions. The firewall is compatible with her operating system and has gotten good customer reviews. After performing the installation last week, she notices that numerous malicious exploits are successfully hacking her computer. What went wrong?

She forgot to disable native firewall when installing the 3rd party firewall

Every morning when James logs into his computer and attempts to access Microsoft 365, he is asked to enter his password. After that, he is sent a text on his mobile phone with a six-digit code he must enter. In terms of multifactor authentication, his password is something he knows. What is the text message?

Something he has

A company;s cybersecurity trainer is recording a Lunch and Learn video for new employees. The trainer discusses the dangers of spam. Besides being annoying what other problem could spam cause?

Spam could contain a link thata uploads malicious software

The imitation of source email, IP, or MAC addresses is part of which type of attack?

Spoofing

Which network device differentiates network traffic using Layer 2 of the OSI model?

Switch

One of the improvements of IPv6 versus IPv4 is better security (T/F)

True

Peer pressure is a form of motivation for some hackers (T/F)

True

Remote control is the ability to use a local computer to remotely take over control of another computer over network (T/F)

True

TCP/IP is a suite of two communications protocols (T/F)

True

When considering netowrk expenditures, sunk costs should not influence future choices (T/F)

True

Samantha is a network engineer. She is writing a proposal to her company's chief information officer (CIO) about the deployment of a group of end user-nodes to replace the office's aging workstations. Her solution is to use PCs with only display screens, keyboards, and mice, with all of the computing work and storage hosted on servers. What is her solution?

Thin client

A company's IT security engineer has noticed several employees periodically checking their social media accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the engineer casually observes one user about to click the link to view a video, she stops the worker. Afterward, she approaches the cheif information officer (CIO) and advises that all social media accounts be blocked, and that only online training videos authorized by the company be allowed to be viewed. What threat is the IT security engineer concerned about?

Trojan horse

A good practice is to trust no network traffic until is is proved to comply with security policy (T/F)

True

A guideling for firewall selection is to enver skim on throughput (T/F)

True

A wrapper is a specialized tool used by hackers to build Trojan horses (T/F)

True

An IPv6 address consists of 128 bits; and IPv4 address consists of 32 bits (T/F)

True

Content filtering can focus on domain name, URL, filename, file extension, or keywords in the content of a packet (T/F)

True

IT infrastructure growth can be expected, unexpected, gradual, or abrupt (T/F)

True

In a full connection mesh topology, all devices on a network are connected to all other devices (T/F)

True

The chief information officer (CIO) is negotiating lease prices with several telecommunications providers. She wants a service that offers circuts that will link to various physical buildings and branches, including a connection to the physical demarcation point. For what network infrastructure will this service be used?

Wide area network (WAN)

Vivienne has been commissioned to design a workgroup network infrastructure for a small office that includes five workstations, three laptops, and a printer. Given that some of the nodes are stationary and others are mobile, what is the best solution for interconnectivity?

Wireless access point (WAP) and wired switch

Kristin's position in IT focuses on using antvirus, anti-spyware, and vulnerability software patch management to maintain security and integrity. Which IT infrastructure domain is she protecting?

Workstation domain


Ensembles d'études connexes

Chapter 5 safe vehicle operation

View Set

Review 5. Vocab. B. Complete the second sentence using the given word. Use between three and eight words.

View Set

Scientific Method and Characteristics of Living things Review for test

View Set

Geol chapter 5 reading assessment

View Set

Basic Appraisal Principles Ch 16: Market Analysis

View Set

System Analysis and Project MANAGEMENT CLASS

View Set