Data Networks Exam 1
At what layer would you find packets? Question options: A) 3 B) 4 C) 1 D) 2
A) 3
Which of the following is an integer? Question options: A) 4,307 B) 45.7 C) both 4,307 and 45.7 D) neither 4,307 nor 45.7
A) 4,307
How many wires are there is a UTP Ethernet cord? Question options: A) 8 B) 2 C) 1 D) 4
A) 8
The ________ standard was created to prevent attackers from walking in and simply plugging a computer into a wall jack and therefore accessing the network. Question options: A) 802.1X B) Ethernet firewall C) 802.3X D) 802.1AE
A) 802.1X
________ is the percentage of time that a network is available for use. Question options: A) Availability B) Downtime C) QoS D) None of these
A) Availability
What type of address is 32 bits long? Question options: A) IPv4 B) IPv6 C) EUI-48 D) All of these
A) IPv4
Ethernet addresses were formerly called ________ addresses. Question options: A) MAC B) IP C) both MAC and IP D) neither MAC nor IP
A) MAC
A program that can capture passwords as you enter them is ________. Question options: A) a keystroke logger/spyware B) data mining software C) both a keystroke logger/spyware and data mining software D) neither a keystroke logger/spyware nor data mining software
A) a keystroke logger/spyware
An Ethernet switch knows ________. Question options: A) a single port number for each EUI-48 address B) the entire path from the source host to the destination host C) multiple port numbers for each EUI-48 address D) an IP address for each EUI-48 address
A) a single port number for each EUI-48 address
Network speeds usually are measured in ________. Question options: A) bits per second B) bytes per second C) both bits per second and bytes per second D) neither bits per second nor bytes per second
A) bits per second
An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.) Question options: A) defense in depth B) comprehensive security C) risk assurance D) having a DMZ
A) defense in depth
The Target attackers probably first broke into Target using the credentials of a(n) ________. Question options: A) employee in a firm outside Target B) Target IT employee C) low-level Target employee D) Target security employee
A) employee in a firm outside Target
Another term for authorization is ________. Question options: A) permission B) establishing the creator of a file C) authentication D) token
A) permission
Ethernet standards are specified at the ________ layer. Question options: A) physical B) data link C) both physical and data link D) neither physical nor data link
A) physical
A man in the middle attack ________. Question options: A) reads traffic traveling between one host to another B) creates a denial service attack on both parties C) creates a denial of service attack against the client D) None of these
A) reads traffic traveling between one host to another
UDP is ________. Question options: A) reliable B) unreliable C) It depends on the situation. D) None of these
A) reliable
Tricking users into doing something against their security interests is ________. Question options: A) social engineering B) hacking C) both social engineering and hacking D) neither social engineering nor hacking
A) social engineering
An attack aimed at a single person or a small group of individuals is a(n) ________ attack. (Choose the most specific answer.) Question options: A) spear phishing B) phishing C) highly targeted D) customized
A) spear phishing
How a message is organized is its ________. Question options: A) syntax B) protocol C) order D) semantics
A) syntax
Wireless network standards operate at ________. Question options: A) the data link layer B) the Internet layer C) both the data link layer and the Internet layer D) neither the data link layer nor the Internet layer
A) the data link layer
The general name for a security flaw in a program is a ________. Question options: A) vulnerability B) virus C) security fault D) malware
A) vulnerability
Which of the following is the newest Wi-Fi standard? Question options: A) 802.11b B) 802.11n C) 802.11ac D) 802.11g
C) 802.11ac
Internet standards are published as ________. Question options: A) RFCs B) Internet Protocols C) IETFs D) TCP/IPs
C) IETFs
Requiring someone to use a resource to prove his or her identity is ________. Question options: A) both authentication and authorization B) authorization C) authentication D) confidentiality
C) authentication
The Ethernet data field contains ________. Question options: A) a packet B) the LLC subheader C) both a packet and the LLC subheader D) neither a packet nor the LLC subheader
C) both a packet and the LLC subheader
An extended service set (ESS) is a group of BSSs that ________. Question options: A) are connected to the same distribution system B) have the same SSID C) both are connected to the same distribution system and have the same SSID D) neither are connected to the same distribution system nor have the same SSID
C) both are connected to the same distribution system and have the same SSID
802.11i provides ________. Question options: A) confidentiality B) message integrity C) both confidentiality and message integrity D) neither confidentiality nor message integrity
C) both confidentiality and message integrity
When a firewall identifies an attack packet, it ________. Question options: A) discards the packet B) copies information about the packet into a log file C) both discards the packet and copies information about the packet into a log file D) neither discards the packet nor copies information about the packet into a log file
C) both discards the packet and copies information about the packet into a log file
Momentary traffic peaks can lead to ________. Question options: A) latency B) packet loss C) both latency and packet loss D) neither latency nor packet loss
C) both latency and packet loss
Jitter is a problem for ________. Question options: A) voice over IP (VoIP) B) streaming media C) both voice over IP (VoIP) and streaming media D) neither voice over IP (VoIP) nor streaming media
C) both voice over IP (VoIP) and streaming media
The general name for evil software is ________. Question options: A) exploit B) virus C) malware D) worm
C) malware
Unsolicited commercial e-mail is better known as ________. Question options: A) identity theft B) social engineering C) spam D) adware
C) spam
What organization creates Ethernet standards? (Give the most specific answer.) Question options: A) OSI B) ISO C) IETF D) IEEE
D) IEEE
An EUI-48 address was formerly called a(n) ________ address. Question options: A) IPv6 B) IPv4 C) DNS D) MAC
D) MAC
Balancing threats against protection costs is called ________. Question options: A) economic justification B) defense in depth C) comprehensive security D) risk analysis
D) risk analysis
The messages of VPNs ________. Question options: A) are not encrypted B) are encrypted
B) are encrypted
At what layer are frames standardized? Question options: A) physical B) data link C) Internet D) All of these
B) data link
A notebook computer configured to act like a real access point is a(n) ________. Question options: A) rogue access point B) evil twin access point
B) evil twin access point
Latency is usually measured in ________. Question options: A) bits per second (bps) B) milliseconds (ms) C) minutes of downtime D) None of these
B) milliseconds (ms)
Switches make decisions based on the ________. Question options: A) destination data link layer address B) physical link address C) phase of the moon D) source data link layer address
B) physical link address
SNMP Set commands can ________. Question options: A) ask agents for information about the managed device B) reroute traffic C) both ask agents for information about the managed device and reroute traffic D) neither ask agents for information about the managed device nor reroute traffic
B) reroute traffic
An unauthorized internal access point is a(n) ________ access point. Question options: A) shadow B) rogue C) evil twin D) counterfeit
B) rogue
In QoS, the S stands for ________. Question options: A) security B) service C) software D) satisfaction
B) service
To drive around a city looking for working access points that are unprotected is ________. Question options: A) drive-by hacking B) war driving
B) war driving
Wi-Fi Standards come from the ________ Working Group. Question options: A) 802.1X B) 802.11 C) 802.3 D) 802.1
B) 802.11
What is the strongest security protocol for 802.11 today? Question options: A) 802.11s B) 802.11i C) 802.11X D) WPA
B) 802.11i
What 802 Working Group creates Ethernet standards? Question options: A) 802.1 B) 802.3 C) 802.11 D) 802.2
B) 802.3
Which of the following was created for PANs? Question options: A) 802.11 B) Bluetooth C) both 802.11 and Bluetooth D) neither 802.11 nor Bluetooth
B) Bluetooth
In LANs, ________ typically is for ________. Question options: A) optical fiber, access lines B) UTP, access lines C) UTP, trunk lines D) None of these
B) UTP, access lines
SNMP is Question options: Simple Network Management Protocol Simple Network Management Portal Simple NIC Management Protocol Small Network Management Protocol
Simple Network Management Protocol