Midterm IS435

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

50) The UDP header has ________ fields. A) 4 B) 8 C) 16 D) 32

A) 4

Which of the following is an Internet supervisory protocol? A) DNS B) IP C) both A and B D) neither A nor B

A) DNS

199) ________ stop definite attack packets. A) Firewalls B) IDSs C) both A and B D) neither A nor B

A) Firewalls

________ have DHCP servers. A) Home access routers B) Internet core routers C) both A and B D) neither A nor B

A) Home access routers

48) Which of the following is a connectionless protocol? A) IP B) TCP C) both A and B D) neither A nor B

A) IP

11) Routing is based on a(n) ________. A) IP address B) single-network address C) either A or B D) neither A nor B

A) IP address

27) A standards agency for OSI is ________. A) ITU-T B) IETF C) both A and B D) neither A nor B

A) ITU-T

161) To manage their Ethernet networks, companies rely on ________. A) SNMP B) HTTP C) FTTH D) none of the above

A) SNMP

44) If a destination host receives a correct segment, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing

A) an ACK segment

52) On a server, well-known port numbers indicate ________. A) applications B) connections with client computers C) both A and B D) neither A nor B

A) applications

196) Desktop (tabletop) rehearsals are important because they ________ compared to live rehearsals. A) are relatively inexpensive B) get into specific details C) both A and B D) neither A nor B

A) are relatively inexpensive

88) SNMP Get commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B

A) ask agents for information about the managed device

149) In optical fiber, light travels through the ________. A) core B) cladding C) both A and B

A) core

116) In authentication, ________ are the general name for proofs of identity. A) credentials B) authorizations C) digital certificates D) all of the above

A) credentials

47) If the destination internet process detects an error, it ________. A) discards the packet B) sends back a segment notifying the sender C) both A and B D) neither A nor B

A) discards the packet

94) Routing packets is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control

A) forwarding

97) Users typically can eliminate a vulnerability in one of their programs by ________. A) installing a patch B) using an antivirus program C) both A and B D) neither A nor B

A) installing a patch

121) A firewall will drop a packet if it ________. A) is a definite attack packet B) is a highly probable attack packet C) both A and B D) neither A nor B

A) is a definite attack packet

114) Using SSL/TLS for Web applications is attractive because SSL/TLS ________. A) is essentially free to use B) offers the strongest possible cryptographic protections C) both A and B D) neither A nor B

A) is essentially free to use

73) When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________. A) latency B) output C) jitter D) throughput

A) latency

158) Ethernet became the dominant LAN technology because of ________. A) low cost B) high speed C) link reliability D) agility

A) low cost

91) Using standard configurations ________. A) saves money B) gives management agility C) both A and B D) neither A nor B

A) saves money

53) The range of port 1024 to port 4999 is the usual range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B

B Ephemeral

16) In a point-to-point single network, how many physical links will there be when a packet is transmitted? A) 0 B) 1 C) 2 D) We cannot say with the information provided.

B) 1

69) In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps. The throughput is half the rated speed. If each person downloading is getting an average of 200Mbps, how many people are using the Internet at that moment? A) 10 B) 5 C) 2 D) none of the above

B) 5

12) Paths across a single network are called ________. A) routes B) data links C) physical links D) none of the above

B) data links

172) Vulnerabilities are occasionally found in even the best security products. Consequently, companies must specifically ________. A) outsource security B) have defense in depth C) do risk analysis D) only give minimum permissions

B) have defense in depth

70) Trunk lines in the Internet core are ________. A) dedicated B) multiplexed C) both A and B D) neither A nor B

B) multiplexed

138) To transmit three bits per clock cycle, you must have ________ states. A) 3 B) 6 C) 8 D) 16

C) 8

132) What 802 Working Group creates Ethernet standards? A) 802.1 B) 802.2 C) 802.3 D) 802.11

C) 802.3

189) The policy server creates ________. A) DMZs B) policies C) ACLs for individual firewalls D) standards that firewalls must follow

C) ACLs for individual firewalls

135) ________ links connect users to workgroup switches. A) Trunk B) Core C) Access D) Workgroup

C) Access

109) Who are the most dangerous types of employees? A) financial employees B) manufacturing employees C) IT security employees D) former employees

C) IT security employees

7) What process adds a header in front of a TCP segment? A) Application B) Transport C) Internet D) Data Link

C) Internet

75) Guarantees for quality of service are called ________. A) QoS-G B) QoS metrics C) SLAs D) QoS guarantees

C) SLAs

42) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. A) ACK B) SYN C) SYN/ACK D) none of the above

C) SYN/ACK

45) In a four-step close, which side transmits a FIN segment? A) the side that initiates the close B) the side that does not initiate the close C) both A and B D) neither A nor B

C) both A and B

51) UDP ________. A) is unreliable B) has a checksum field C) both A and B D) neither A nor B

C) both A and B

81) Momentary traffic peaks can lead to ________. A) latency B) packet loss C) both A and B D) neither A nor B

C) both A and B

83) Traffic shaping may ________ traffic that is undesirable. A) prohibit B) limit C) both A and B D) neither A nor B

C) both A and B

86) Ping tells you ________. A) that a host is reachable B) latency in the connection to the host C) both A and B D) neither A nor B

C) both A and B

90) Using the SNMP Set command ________. A) saves management labor B) requires excellent security C) both A and B D) neither A nor B

C) both A and B

9) The transport layer on the destination host ________. A) reassembles the application message if it has been fragmented B) removes the transport header C) both A and B D) neither A nor B

C) both A and B are the answer

25) Network standards provide ________. A) strobing B) synchronization C) interoperability D) entanglement

C) interoperability

95) The general term for evil software is ________. A) virus B) worm C) malware D) all of the above

C) malware

167) Security is primarily about ________. A) technology B) planning C) management D) none of the above

C) management

65) QoS is quantified through ________. A) criteria B) consensus C) metrics D) none of the above

C) metrics

37) At what layer, will you find standards for routes? A) application B) data link C) transport D) Internet

D) Internet

93) Creating switching and routing tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control

D) control

171) An attacker must break through two firewalls to get to a host. This most specifically illustrates the ________ principle. A) comprehensive security B) risk assurance C) weakest link protection D) defense in depth

D) defense in depth

13) If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12

2

141) How long (in milliseconds) is a clock cycle if I transmit 400 Mbps with four states? A) 0.000005 B) 0.0025 C) 0.005 D) none of the above

A) 0.000005

140) If you double the number of states, you can transmit ________ more bit(s) per clock cycle. A) 1 B) 2 C) 4 D) none of the above

A) 1

18) A host sends a packet to another host containing seven single networks along the way. How many other hosts will there be along the route when Host A transmits? A) 1 B) 2 C) 7 D) 9

A) 1

39) If two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 7

A) 1

A host sends a packet to another host containing six single networks along the way. How many routes are included in this transmission? A) 1 B) 6 C) 7 D) 8

A) 1

IPv4 addresses are ________ bits long. A) 32 B) 64 C) 128 D) none of the above

A) 32

153) If a physical link can use either 4-pair UTP, multimode fiber, or single-mode fiber, which should I use? A) 4-pair UTP B) multimode fiber C) single-mode fiber D) none of the above

A) 4-pair UTP

164) To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE

A) 802.1X

105) ________ is a program that can capture passwords as you enter them. A) A keystroke logger B) Data mining software C) both A and B D) neither A nor B

A) A keystroke logger

72) ________ is the percentage of time that a network is available for use. A) Availability B) Downtime C) QoS D) none of the above

A) Availability

54) The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server

A) Client

127) Which of the following is the most frustrating to use? A) IDSs B) opaque filtering C) SPI firewalls D) NGFW firewalls

A) IDSs

136) ________ links connect switches to other switches. A) Trunk B) Long C) Access D) Workgroup

A) Trunk

46) Which of the following is NOT one of the three general parts of messages? A) address field B) header C) data field D) trailer

A) address field

150) The strength of a wave is its ________. A) amplitude B) frequency C) wavelength D) force

A) amplitude

111) Electronic signatures provide message-by-message ________. A) authentication B) confidentiality C) both A and B D) neither A nor B

A) authentication

182) There should be relatively free access ________. A) between the Internet and the DMZ B) between the DMZ and the firm's internal network C) both A and B D) neither A nor B

A) between the Internet and the DMZ

66) Transmission speed is normally measured in ________. A) bits per second B) bytes per second C) octets per second D) none of the above

A) bits per second

5) When you use your tablet to access the internet, the tablet is a ________. A) client host B) server host C) both A and B D) neither A nor B

A) client host

130) Ethernet messages are ________. A) frames B) packets C) segments D) not named

A) frames

170) Attackers only need to find a single weakness to break in. Consequently, companies must ________. A) have comprehensive security B) have insurance C) do risk analysis D) only give minimum permissions

A) have comprehensive security

89) The SNMP manager stores the information it receives from Get commands ________. A) in the MIB B) on the agent C) on the managed device D) in the cloud

A) in the MIB

74) Variability in delay is called ________. A) jitter B) variance C) a QoS failure D) latency

A) jitter

179) On sensitive resources, authenticated parties should get ________. A) least permissions B) standard permissions C) no permissions D) maximum permissions

A) least permissions

22) Stateful packet inspection firewalls are attractive because of their ________. A) low cost for a given traffic volume B) ability to base rules on specific application programs C) both A and B D) neither A nor B

A) low cost for a given traffic volume

78) An SLA specifies ________. A) maximum latency B) minimum latency C) both A and B D) neither A nor B

A) maximum latency

152) Modal dispersion limits transmission distance in ________. A) multimode fiber B) single-mode fiber C) both A and B D) neither A nor B

A) multimode fiber

180) Companies should have ________ for each site. A) multiple security domains B) a single security domain C) at least two DMZs D) multiple DMZs

A) multiple security domains

191) Normal incidents are handled by the ________. A) on-duty staff B) CSIRT (computer security incident response team) C) outside consultant D) FBI

A) on-duty staff

178) Another term for authorization is ________. A) permission B) authentication C) scope D) establishing the creator of a file

A) permission

33) At what layer, will you find standards for access points? A) physical B) data link C) both A and B D) neither A nor B

A) physical B) data link C) both A and B answer is C

188) Which of the following MUST be followed? A) standards B) guidelines C) both A and B D) neither A nor B

A) standards

67) Throughput is ________. A) the speed a network actually provides to users B) a network's rated speed C) both A and B D) neither A nor B

A) the speed a network actually provides to users

156) 850 nm multimode fiber is used in LANs ________. A) to keep cost low B) to have the longest transmission distances C) both A and B D) neither A nor B

A) to keep cost low

186) Oversight activities include ________. A) vulnerability testing B) creating guidelines C) both A and B D) neither A nor B

A) vulnerability testing

187) Attacking your own firm occurs in ________. A) vulnerability testing B) auditing C) both A and B D) neither A nor B

A) vulnerability testing

173) There is a single countermeasure in ________. A) weakest links B) defense in depth C) both A and B D) neither A nor B

A) weakest links

184) A policy specifies ________. A) what should be done B) how to do it C) both A and B D) neither A nor B

A) what should be done

71) The business benefit of multiplexing is ________. A) lower cost B) higher speed C) avoiding the need to send many transmission links through narrow conduits D) security

Answer: A

113) The messages of VPNs ________. A) share the same transmission lines used by other VPNs B) are encrypted C) both A and B D) neither A nor B

Answer: C

49) If someone says that a 1-bit flag is set, it is given the value ________. A) 0 B) 1 C) either 0 or 1 D) neither 0 or 1

B) 1

60) Convert decimal 8 to binary. A) 100 B) 1000 C) 10000 D) 111

B) 1000

159) What is 9F hex in binary? A) 10001101 B) 10011111 C) 10101111 D) 11111001

B) 10011111

160) What is binary 0010 in hex? A) 1 B) 2 C) 3 D) none of the above

B) 2

63) The five senses can be represented with a ________-bit field. A) 2 B) 3 C) 4 D) 5

B) 3

139) A system with 16 states can transmit ________ bits per clock cycle A) 3 B) 4 C) 5 D) none of the above

B) 4

142) What type of copper wiring is widely used in Ethernet? A) optical fiber B) 4-pair UTP C) both A and B D) neither A nor B

B) 4-pair UTP

19) A host sends a packet to another host containing six single networks along the way. How many data links are used for this transmission? A) 1 B) 6 C) 7 D) 8

B) 6

21) A host sends a packet to another host with six single networks along the way. How many frames are involved? A) 1 B) 6 C) 7 D) 8

B) 6

177) ________ are actions people can take on a resource. A) Provisions B) Authorizations C) Authentications D) Risks

B) Authorizations

56) "Octet" is the same as ________. A) "bit" B) "byte" C) either A or B, depending on the context D) neither A nor B

B) Byte

192) Major incidents are handled by the ________. A) on-duty staff B) CSIRT (computer security incident response team) C) outside consultant D) FBI

B) CSIRT (computer security incident response team)

200) ________ focus on suspicious packets. A) Firewalls B) IDSs C) both A and B D) neither A nor B

B) IDSs

26) Which standards agency is especially important for internet processes? A) ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B is important.

B) IETF

32) At what layer, will you find standards for routers? A) transport B) Internet C) both A and B D) neither A nor B

B) Internet

80) ________ can be addressed by using priority. A) Chronic lacks of capacity B) Momentary traffic peaks C) both A and B D) neither A nor B

B) Momentary traffic peaks

126) Which type of firewall filtering looks at application-layer content? A) stateful packet inspection B) NGFW C) both A and B D) neither A nor B

B) NGFW

17) Which of the following is true? A) Frames are carried inside packets. B) Packets are carried inside frames. C) both A and B D) neither A nor B

B) Packets are carried inside frames.

144) 4-pair UTP terminates in a(n) ________ connector. A) USB B) RJ-45 C) SC D) standard telephone

B) RJ-45

55) The destination socket is 60.171.18.22:161. The destination host is a(n) ________. A) client B) server C) well-known server D) ephemeral server

B) Server

82) To handle momentary traffic peaks, which would you give higher priority to? A) e-mail B) VoIP C) both A and B D) It is impossible to say with the information provided.

B) VoIP

100) ________ are full programs. A) Viruses B) Worms C) both A and B D) neither A nor B

B) Worms

193) CSIRT leaders should come from ________. A) an outside crisis vendor B) a business department C) the security department D) the IT department

B) a business department

115) Requiring someone prove his or her identity is ________. A) confidentiality B) authentication C) authorization D) both B and C

B) authentication

175) Allowing a user access to edit files in a specific directory is an example of ________. A) authentication B) authorizations C) defense in depth D) network segregation

B) authorizations

106) In a DDoS attack, a ________ sends messages directly to the victim. A) botmaster B) bot C) command and control server D) all of the above

B) bot

79) ISPs usually offer QoS guarantees to ________. A) residential customers B) business customers C) both A and B D) neither A nor B

B) business customers

148) Which UTP quality levels are needed to send signals 100 meters at 10 gigabits per second? A) category 6 B) category 6A C) both A and B D) neither A nor B

B) category 6A

87) SNMP Set commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B

B) change router operation

10) Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________. A) authentication B) confidentiality C) both A and B D) neither A nor B

B) confidentiality

134) What type of switch connects switches to other switches? A) trunk switches B) core switches C) workgroup switches D) none of the above

B) core switches

The IETF primarily ________. A) manages the Internet B) creates Internet standards C) coordinates the work of ISPs D) all of the above

B) creates Internet standards

131) The path a message takes from the source host to the destination device in an Ethernet network is a ________. A) physical link B) data link C) route D) label-switched route

B) data link

34) At what layer, will you find standards for switches? A) application B) data link C) transport D) Internet

B) data link

35) At what layer, will you find standards for frames? A) application B) data link C) transport D) Internet

B) data link

38) At what layer, will you find standards for EUI-48 addresses? A) application B) data link C) transport D) Internet

B) data link

107) Advanced persistent threats are ________. A) inexpensive for the attacker B) extremely dangerous for the victim C) both A and B D) neither A nor B

B) extremely dangerous for the victim

22) Source and destination EUI-48 (or MAC) addresses are found in ________ headers. A) IP B) frame C) TCP D) UDP

B) frame

146) The ability to transmit in two directions simultaneously is ________. A) parallel communication B) full-duplex communication C) both A and B D) neither A nor B

B) full-duplex communication

197) Live rehearsals are important because they ________ compared to desktop rehearsals. A) are relatively inexpensive B) get into specific details C) both A and B D) neither A nor B

B) get into specific details

118) Digital certificate authentication fails if the supplicant ________. A) is the true party B) learns the true party's private key C) learns the true party's public key D) either B or C

B) learns the true party's private key

77) An SLA specifies ________. A) maximum speed B) minimum speed C) both A and B D) neither A nor B

B) minimum speed

84) SNMP agents communicate with the ________. A) network visibility program B) network management program C) MIB D) all of the above

B) network management program

124) How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP segment that contains an acknowledgement? A) process it through the Access Control List (ACL) B) pass it if it is part of an approved connection C) both A and B D) neither A nor B

B) pass it if it is part of an approved connection

28) Which layer governs wires? A) transport B) physical C) Internet D) none of the above

B) physical

117) Iris scanning is attractive because of its ________. A) low cost B) precision C) both A and B D) neither A nor B

B) precision

168) Which phase of the plan-protect-respond cycle takes the largest amount of work? A) plan B) protect C) respond D) The phases require about equal amounts of effort.

B) protect

8) When a frame arrives, the data link process on the destination host ________. A) adds a header B) removes a header C) both A and B D) neither A nor B

B) removes a header

169) Balancing threats against protection costs is called ________. A) economic justification B) risk analysis C) comprehensive security D) The Illusion of Cost

B) risk analysis

181) DMZs are places for ________. A) servers that are not accessible to clients outside the firm B) servers that are freely accessible to clients outside the firm C) servers that are freely accessible to clients inside the firm D) servers that are inaccessible to any clients

B) servers that are freely accessible to clients outside the firm

99) What kind of attack is most likely to succeed against a system with no technological vulnerabilities? A) malware B) social engineering C) both A and B D) neither A nor B

B) social engineering

147) The main benefit of parallel transmission over serial transmission is ________. A) reliability B) speed C) both A and B D) neither A nor B

B) speed

6) What process adds a header in front of an application message or fragment? A) application B) transport C) internet D) data link

B) transport

57) Ethernet has a Frame Check Sequence Field to check for errors. Ethernet is ________. A) reliable B) unreliable C) both A and B D) neither A nor B

B) unreliable

76) An SLA specifies the ________. A) best case B) worst case C) both A and B D) neither A nor B

B) worst case

68) In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. If you and three others are transmitting or receiving at the same time, what speed should you expect to get? A) 0.5 Mbps B) 1 Mbps C) 1.25 Mbps D) none of the above

C) 1.25 Mbps

154) Two switches that are 200 m apart at a speed of 20 Gbps should be connected using ________. A) 10GBASE-SR B) 100GBASE-SR C) 10GBASE-SR with bonding D) 100GBASE-SR with bonding

C) 10GBASE-SR with bonding

61) A 5-bit field can represent ________ alternatives or different combinations. A) 8 B) 16 C) 32 D) 64

C) 32

40) If two hosts are connected by five networks, how many routers will there be when one host sends a packet to the other host? A) 1 B) 2 C) 4 D) 5

C) 4

62) To represent 65 alternatives, your alternatives field would have to be at least ________ bits long. A) 5 B) 6 C) 7 D) 8

C) 7

104) ________ is the general name for malware on a user's PC that collects sensitive information and sends this information to an attacker. A) A keystroke logger B) Anti-privacy software C) Spyware D) Data mining software

C) Spyware

174) A central firewall management program that specifically pushes changes to firewalls is ________. A) a weakest link B) defense in depth C) a single point of takeover D) risk analysis thinking

C) a single point of takeover

108) Employees often attack ________. A) for revenge B) for money C) both A and B D) neither A nor B

C) both A and B

120) When a firewall identifies an attack packet, it ________. A) discards the packet B) copies information about the packet into a log file C) both A and B D) neither A nor B

C) both A and B

129) Ethernet standards are specified at the ________ layer. A) physical B) data link C) both A and B D) neither A nor B

C) both A and B

137) Physical layer standards govern ________. A) signaling B) physical connectors C) both A and B D) neither A nor B

C) both A and B

163) Rapid Spanning Tree Protocol (RSTP) ________. A) can increase reliability B) was created to break accidental loops C) both A and B D) neither A nor B

C) both A and B

185) Policies should drive ________. A) implementation B) oversight C) both A and B D) neither A nor B

C) both A and B

190) Successful attacks are called ________. A) breaches B) compromises C) both A and B D) neither A nor B

C) both A and B

198) Real-time fail-over with synchronized data centers ________. A) is expensive B) minimizes downtime C) both A and B D) neither A nor B

C) both A and B

31) Which layer(s) governs transmission through a single network? A) data link B) physical C) both A and B D) neither A nor B

C) both A and B

92) SDN can ________. A) permit routing rules to be changed rapidly B) reduce router costs C) both A and B D) neither A nor B

C) both A and B

ISPs ________. A) carry traffic on the Internet B) connect users to the Internet C) both A and B D) neither A nor B

C) both A and B

195) CSIRTs rehearse an incident by talking about what should be done without actually doing it in ________. A) simulations B) live rehearsals C) desktop rehearsals (also called tabletop rehearsals) D) none of the above

C) desktop rehearsals (also called tabletop rehearsals)

58) Converting application messages into bits is called ________. A) encapsulation B) encryption C) encoding D) exchange

C) encoding

157) In Ethernet, switches are organized in a ________. A) ring B) mesh C) hierarchy D) any of the above

C) hierarchy

23) When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually ________. A) drops the packet B) drops the packet and notifies an administrator C) passes the packet D) passes the packet, but notifies an administrator

C) passes the packet

125) SPI firewalls are being replaced in large part because they are limited in their ability to detect ________. A) NAT B) piggybacking C) port spoofing D) none of the above

C) port spoofing

103) In a ________ attack, the attacker encrypts some or all of the victim's hard drive. A) virus B) DoS C) ransom D) lock

C) ransom

64) In QoS, the S stands for ________. A) software B) security C) service D) satisfaction

C) service

155) The longest transmission distances are possible with ________. A) USB B) UTP C) single-mode fiber D) multimode fiber

C) single-mode fiber

119) A debit card is secure because it requires two credentials for authentication-the card itself and a PIN. This is called ________. A) segmentation B) redundancy C) two-factor authentication D) none of the above

C) two-factor authentication

14) If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12

D) 12

1) If two hosts are connected by five switches, how physical links will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 6

D) 6

59) Transmitting "Oh, My!" without the quotes in ASCII requires ________ octets. A) 2 B) 4 C) 6 D) 7

D) 7

143) How many wires are there in a 4-pair UTP Ethernet cord? A) 1 B) 2 C) 4 D) 8

D) 8

165) To prevent an unauthorized user from sending supervisory commands to switches, companies use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE

D) 802.1AE

96) ________ is the general name for a security flaw in a program. A) A virus B) Malware C) A security fault D) A vulnerability

D) A vulnerability

128) ________ look at ________, while ________ mostly look at ________. A) Antivirus programs; packets; firewalls; packets B) Antivirus programs; files; firewalls; files C) Antivirus programs; packets; firewalls; files D) Antivirus programs; files; firewalls; packets

D) Antivirus programs; files; firewalls; packets

151) ________ describe light entering a fiber's core at different angles. A) Co-cycle waves B) Harmonics C) Divergences D) Different modes

D) Different modes

166) After an ARP cache poisoning attack, the ARP cache gives the ________. A) IP address of the router the user wishes to send to B) EUI-48 address of the router the user wishes to send to C) IP address of the router the MITM attacker D) EUI-48 address of the router the MITM attacker

D) EUI-48 address of the router the MITM attacker

36) At what layer, will you find standards for IP addresses? A) application B) data link C) transport D) Internet

D) Internet

Who owns the Internet? A) The U.S. Government B) The United Nations C) The IETF D) No one

D) No one

101) Malware programs that masquerade as system files are called ________. A) viruses B) scripts C) root malware D) Trojan horses

D) Trojan horses

112) Secured packets typically receive ________. A) confidentiality B) authentication C) message integrity D) all of the above

D) all of the above

194) Which department will almost always be involved in a CSIRT? A) the IT department B) the legal department C) the human resources department D) all of the above

D) all of the above

183) It is hardest to create good security ________. A) policies B) procedures C) processes D) culture

D) culture

145) Optical fiber cords use two strands ________. A) for reliability through redundancy B) to form a complete electrical loop C) to double the transmission speed D) for full-duplex transmission

D) for full-duplex transmission

2) We call any device connected to the Internet a(n) ________. A) IP B) client C) router D) host

D) host

176) If someone has been properly authenticated, they should receive ________ permissions. A) all B) no C) maximum D) minimum

D) minimum

30) Which standards layer governs multiuser word processing programs? A) data link B) transport C) Internet D) none of the Above

D) none of the Above

29) Which standards layer governs e-mail? A) data link B) transport C) Internet D) none of the above

D) none of the above

43) If a destination host receives a TCP segment with an error, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing

D) nothing

102) Pieces of code that is executed after the virus or worm has spread are called ________. A) vulnerabilities B) exploits C) compromises D) payloads

D) payloads

5) To determine if a host is reachable, you send a(n) ________. A) SNMP SET command B) MIB C) trap D) ping

D) ping

133) What type of switch connects users to the network? A) user switches B) core switches C) access switches D) workgroup switches

D) workgroup switches

98) Vulnerability-based attacks that occur before a patch is available are called ________ attacks. A) indefensible B) stealth C) malware D) zero-day

D) zero-day

24) Internet standards are published as ________. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols

RFCs


Ensembles d'études connexes

Anatomy Test 2 (Chapter 21 and 23)

View Set

Essential Cloud Infrastructure: Foundation

View Set

Install and configure SharePoint farms

View Set

Chapter 4 - Contract of Sales and Leases

View Set

CYBR2.TestOut Chap 5 MC Style Review (601) (39)

View Set

Major Muscles That Act at the Wrist

View Set

Chapter 9 Regional Economic Integration

View Set

Macro: Ch 30- Aggregate Demand and Aggregate Supply

View Set