Fundamental Information Security Chapter 10: Networks and Telecommunications

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A packet-filtering firewall remembers information about the status of a network communication. Answers: true or false

false

Implicit deny is when firewalls look at message addresses to determine whether a message is being sent around an unending loop. Answers: true or false

false

A network attacker wants to know IP addresses used on a network, remote access procedures, and weaknesses in network systems. Answers: true or false

true

Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used? Answers: Packet filtering Application proxying Stateful inspection Network address translation

Application proxying

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows? Answers: Router Hub Access point Switch

Switch

A firewall is a basic network security defense tool. Answers: true or false

true

The OSI Reference Model is a theoretical model of networking with interchangeable layers. Answers: true or false

true

The Physical Layer of the OSI Reference Model must translate the binary ones and zeros of computer language into the language of the transport medium. Answers: true or false

true

The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them. Answers: true or false

true

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues? Answers: Firewall Hub Switch Router

Hub

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working? Answers: Application Presentation Session Data Link

Presentation

Henry is creating a firewall rule that will allow inbound mail to the organization. What TCP port must he allow through the firewall? 22 25 53 80

25

What is the maximum value for any octet in an IPv4 IP address? 65 129 255 513

255

Henry's last firewall rule must allow inbound access to a Windows Terminal Server. What port must he allow? Answers: 143 443 989 3389

3389

Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication? Answers: 80 143 443 3389

443

A border router can provide enhanced features to internal networks and help keep subnet traffic separate. Answers: true or false

false

A wireless access point (WAP) is the connection between a wired and wireless network. Answers: true or false

true

Internet Small Computer System Interface (iSCSI) is a storage networking standard used to link data storage devices to networks using IP for its transport layer. Answers: true or false

true

Network access control (NAC) works on wired and wireless networks Answers: true or false

true

Network access control (NAC) works on wired and wireless networks. Answers: true or false

true

TCP/IP is a suite of protocols that operates at both the Network and Transport layers of the OSI Reference Model. Answers: true or false

true

The Data Link Layer of the OSI Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN) Answers: true or false

true

What is NOT a service commonly offered by unified threat management (UTM) devices? Answers: URL filtering Wireless network access Malware inspection Content inspection

Wireless network access

The Transport Layer of the OSI Reference Model creates, maintains, and disconnects communications that take place between processes over the network. Answers: true or false

false

David would like to connect a fibre channel storage device to systems over a standard data network. What protocol can he use? Answers: Internet Small Computer System Interface (iSCSI) Fibre Channel (FC) Fibre Channel over Ethernet (FCoE) Secure Shell (SSH)

Fibre Channel over Ethernet (FCoE)

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use? Answers: Firewall Virtual LAN (VLAN) Virtual private network (VPN) Transport Layer Security (TLS)

Virtual LAN (VLAN)

A subnet mask is a partition of a network based on IP addresses. Answers: true or false

false

Another name for a border firewall is a DMZ firewall. Answers: true or false

false

The Data Link Layer of the OSI Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN). Answers: true or false

true

The three main categories of network security risk are reconnaissance, eavesdropping, and denial of service. Answers: true or false

true

IP addresses are eight-byte addresses that uniquely identify every device on the network. Answers: true or false

false

Karen would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy? Answers: Remote Authentication Dial-In User Service (RADIUS) Lightweight Extensible Authentication Protocol (LEAP) Captive portal Protected Extensible Authentication Protocol (PEAP)

Captive portal

What type of firewall security feature limits the volume of traffic from individual hosts? Answers: Loop protection Network separation Stateful inspection Flood guard

Flood guard

What firewall approach is shown in the figure? Answers: Border firewall Bastion host Screened subnet Multilayered firewall

Screened subnet

Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place? Answers: Teardrop Land Smurf Cross-site scripting (XSS)

Smurf

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use? Answers: Firewall Unified threat management (UTM) Router VPN concentrator

VPN concentrator

What type of network connects systems over the largest geographic area? Answers: Wide area network (WAN) Metropolitan area network (MAN) Local area network (LAN) Storage area network (SAN)

Wide area network (WAN)

Internet Control Message Protocol (ICMP) is a method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address. Answers: true or false

false

A network protocol governs how networking equipment interacts to deliver data across the network. Answers: true or false

true


Ensembles d'études connexes

Communication in Cross-Cultural Context

View Set

SPC Level 2 Exam 2- Delegation Adaptive Quiz

View Set

Chapter 3 - Core Finance: Management Accounting

View Set

everyday life as a learning experience (commonLit)

View Set

Chapter 16. Cloud Computing and Client-side Virtualization

View Set