IS451 Final Exam Spr 2022

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Match each port with its corresponding service name (4) FTP (3) HTTPS (2) DNS (1) SSH

1. 22 2. 53 3. 443 4. 21

____ means that a user calling into a company telephone system provides some form of data by speaking into the telephone, and a database query is performed using this spoken information. A. Fax-back B. Integrated voice recognition and response C. Unified messaging D. Third-party call control

B. Integrated voice recognition and response

Public key cryptography is also called ____________________ encryption. *Fill in the blank*

asymmetric

A digital certificate, or simply a(n) ____________________, is an electronic document, similar to a passport, that establishes your credentials when you are performing transactions on the World Wide Web. *Fill in the blank*

certificate

In computer terminology, a(n) ____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource. *Fill in the blank*

honeypot

Order the steps for digital signature The encrypted document is transferred to the receiver The document including digital signature is encrypted using receiver's public key User's document is hashed to create message digest The document is hashed to create message digest Finally, two message digests are compared. If both are identical, it is authenticated The document separates the original document and digital signature The message digest is encrypted using sender's private key to generate digital signature The digital signature is stamped to the original user's document The digital signature is decrypted using Sender's public key, which generate message digest The receiver decrypts the encrypted document using receiver's private key

(5) The encrypted document is transferred to the receiver (4) The document including digital signature is encrypted using receiver's public key (1) User's document is hashed to create message digest (8) The document is hashed to create message digest (10) Finally, two message digests are compared. If both are identical, it is authenticated (7) The document separates the original document and digital signature (2) The message digest is encrypted using sender's private key to generate digital signature (3) The digital signature is stamped to the original user's document (9) The digital signature is decrypted using Sender's public key, which generate message digest (6) The receiver decrypts the encrypted document using receiver's private key

What are the layers of the TCP/IP suite and what is the roles of each layer? (10 lines) *Written Response*

1. Application Layer: Support the network application and might in some cases include additional services such as encryption or compression 2. Transport Layer: Commonly uses TCP to maintain an error-free end-to-end connection. To maintain this connection, TCP includes error control information in case one packet from a sequence of packet does not arrive at the final destination and packet sequencing information so that all the packets stay in the proper order. 3. Network Layer: Sometimes called the Internet layer or IP layer, is used to transfer data within and between networks. The Internet Protocol (IP) is the software that prepares a packet of data so that it cam move from one network to another on the internet or within a set of corporate networks. As it sends the packet from node to node, it generates the network addressing necessary for the system to recognize the next intended receiver. 4. Network Access layer: This layer gets the data from the user workstation to the internet. The layer prepares a data packet called "frame" for transmission from the user workstation to a router sitting between the local area network and the internet. The frame contains an identifier that signals the beginning and the end of the frame. It can incorporates some form of error detection and it informs the send when such error happens. It performs flow control which ensures that one node does not overwhelm the next node with too much data. 5. Physical layer: the layer in which the actual transmission of data occurs. The physical layer handles voltage levels, plug, and connector dimensions. It transmits the bits of data over the medium (physical wire or radio signal)

What is the IP address that is assigned to the network loopback interface? A. 127.0.0.1 B. 224.0.0.255 C. 1.1.1.1 D. 192.168.1.1

A. 127.0.0.1

Which statement is true about Routers A. Allow communication between computers on different networks B. Work on layer 1 (physical) of the TCP/IP protocol suite C. Transmits data to all connected hosts on the network D. Are the same as hubs

A. Allow communication between computers on different networks

____ cable represented a major improvement in the ability of transmission media to secure sensitive data. A. Fiber-optic B. Twisted C. Coaxial D. Copper

A. Fiber-optic

There is a newer, very high-speed network that will cover the United States, interconnecting universities and research centers at transmission rates up to a gigabit per second (1000 Mbps). The new high-speed network is called ____. A. Internet2 B. FastEthernet C. IPv6 D. Internet6

A. Internet2

____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography. A. Kerberos B. DES C. 3DES D. AES

A. Kerberos

____ is the combination of encryption techniques, software, and services that involves all the necessary pieces to support digital certificates, certificate authorities, and public key generation, storage, and management. A. Public key infrastructure (PKI) B. 3DES C. Data Encryption Standard (DES) D. Advanced Encryption Standard (AES)

A. Public key infrastructure (PKI)

____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation. A. Smurfing B. Spoofing C. E-mail bombing D. Firewalling

A. Smurfing

What statement regarding the use of TCP is accurate: A. The TCP protocol is a connection-oriented communication because it ensures delivery of data. B. UDP is typically used when reliability of the communication is critical. C. UDP uses a constantly adjusting window size to account for existing network traffic. D. TCP utilizes a smaller frame with less header information than UDP.

A. The TCP protocol is a connection-oriented communication because it ensures delivery of data.

When a router receives packets on an interface, which of the following occurs immediately? A. The router consults its routing table to determine where to send the packet B. The router consults its MAC address table to determine where to send the packet C. The router consults its routing table to verify where the packet originated D. The router consults its routing table to determine if the packet is valid

A. The router consults its routing table to determine where to send the packet

A byte consists of 8 bits. A. True B. False

A. True

Every device that has a connection to the Internet is assigned an IP address. A. True B. False

A. True

One of the primary functions of Kerberos is to authenticate users. A. True B. False

A. True

Peer-to-peer networking offers only moderate network security because user account information must be maintained on each workstation. A. True B. False

A. True

The 192.168.100.0 network falls within the private network range. A. True B. False

A. True

The TCP/IP protocol suite does not have rigidly defined layers as the OSI model does. A. True B. False

A. True

The process of authorizing a DHCP server is a security precaution to ensure that IP addresses are only assigned by DHCP servers that are managed by network and server administrators. A. True B. False

A. True

The session layer of the OSI model is responsible for establishing synchronization points. A. True B. False

A. True

The two leading attack methods for the last few years have been socially engineered attacks and exploited known vulnerabilities in operating systems and in application software. A. True B. False

A. True

To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted decimal notation. A. True B. False

A. True

An IP address is broken by a subnet mask into: A. Two parts, network ID and host ID B. Three parts, network ID, subnet, and host ID C. Four parts, network, host, port, connection D. None of these

A. Two parts, network ID and host ID

Many certificates conform to the ____ standard. A. X.509 B. X.309 C. X.409 D. X.609

A. X.509

The ____ layer of the OSI model performs end-to-end error control and end-to-end flow control. A. transport B. application C. presentation D. session

A. transport

____________________ define the network resources that a user or set of users can access. *Fill in the blank*

Access rights

The ___________________________________ was selected by the U.S. government to replace DES. *Fill in the blank*

Advanced Encryption Standard (AES), Advanced Encryption Standard, AES

A valid digital certificate that is not self signed is issued by: A. A VPN server B. A Certification Authority C. A router D. A DirectAccess client

B. A Certification Authority

The ____ is a large, distributed database of Internet addresses and domain names. A. Uniform Resource Locator (URL) B. Domain Name System (DNS) C. Hypertext Transfer Protocol (HTTP) Hypertext D. Markup Language (HTML)

B. Domain Name System (DNS)

A firewall cannot limit users on the Internet from accessing certain portions of a corporate network. A. True B. False

B. False

A packet filter firewall is a computer running proxy server software, whose function is much like that of a librarian who controls access to books in a library's rare books room. A. True B. False

B. False

The DES algorithm works with 128-bit blocks of data. A. True B. False

B. False

The systems development life cycle is a one-time only process. A. True B. False

B. False

There are six basic forms of a classful IPv4 address: Class A, B, C, D, E, and F. A. True B. False

B. False

WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP). A. True B. False

B. False

___ is a set of protocols created to support the secure transfer of data at the IP layer. A. Advanced Encryption Standard (AES) B. IPsec (IP security) C. Date Encryption Standard (DES) D. Transport Layer Security (TLS)

B. IPsec (IP security)

____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users. A. 3DES B. PGP C. DES D. AES

B. PGP

____ is data before any encryption has been performed. A. Encriptext B. Plaintext C. Cryptotext D. Ciphertext

B. Plaintext

Possibly the earliest example of a polyalphabetic cipher is the ____ cipher. A. Roman B. Vigenére C. Enigma D. Caesars

B. Vigenére

The data rate is measured in ____. A. hertz per second (hps) B. bits per second (bps) C. bytes per second (Bps) D. bauds per second (bps)

B. bits per second (bps)

A ____ is an interconnection of computers and computing equipment using either wires or radio waves over small or large geographic areas. A. local area network (LAN) B. computer network C. wireless network D. personal area network (PAN)

B. computer network

The addition of control information to a packet as it moves through the layers is called ____. A. filtering B. encapsulation C. payload D. overloading

B. encapsulation

A(n) ____ is the unique piece of information that is used to create ciphertext and then decrypt the ciphertext back into plaintext. A. encryption algorithm B. key C. firewall D. IP address

B. key

The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers. A. switch B. packet filter C. hub D. proxy server

B. packet filter

A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available. A. firewall B. ping C. DNS D. router

B. ping

The concept of two keys, public and private, is called ____ cryptography. A. private key B. public key C. secret key D. symmetric

B. public key

A protocol analyzer is also known as ____. A. catcher B. sniffer C. cable tester D. simulator

B. sniffer

A professional called a(n) ____________________ typically is responsible for managing a project and following the SDLC phases. *Fill in the blank*

systems analyst

Antivirus software with ________________________________________ runs in the background while an application that the user is executing runs in the foreground. *Fill in the blank*

terminate-and-stay-resident monitoring

With ____________________, the data is encrypted using DES three times—the first time by a first key, the second time by a second key, and the third time by the first key again. *Fill in the blank*

triple-DES

A computer ____________________ is a program that copies itself from one system to another over a network, without the assistance of a human being. *Fill in the blank*

worm

Financial transactions file is an example of Lossless Compression. Explain why? *Written Response*

Lossless compression: Data after compression is the same and we still have the same original data. No data loss.

MP3 music file is an example of Lossy Compression. Explain why? *Written Response*

Lossy compression: Data after compression is different and we don't have the original data because of the conversion from analog to digital, some data is lost. However, human ear cannot detect it.

What are the two important functions that are served by NAT? *Written Response*

Network Address Translation (NAT) serves two important functions: * It enables an organization to automatically assign its own private IP addresses on an internal network without having to setup many globally unique addresses for use over external networks. * It protects computers on an internal network so that computers on external networks, including the Internet, cannot identify their true IP addresses on the internal network.

____________________ (SSL) is an additional layer of software added between the application layer and the transport (TCP) layer that creates a secure connection between sender and receiver. *Fill in the blank*

Secure Sockets Layer

____________________ is the art and science of hiding information inside other, seemingly ordinary messages or documents. *Fill in the blank*

Steganography

IP is a connection-oriented protocol. A. True B. False

B. False

____________________ is the study of creating and using encryption and decryption techniques. *Fill in the blank*

Cryptography

A default route is indicated by what address below? A. 255.255.255.255 B. 127.0.0.1 C. 192.168.1.255 D. 0.0.0.0

D. 0.0.0.0

A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code. *Fill in the blank*

Trojan horse

The 192.161.250.0 network falls within the private network range?! A. True B. False

False

What are the skills needed by a network administrator? *Written Response*

Because many network administrators are dealing with both computers and people, they need the skills necessary to work with both. A checklist of skills for the network administrator would include a wide platform of technology skills, including, but not limited to, knowledge of local area networks, wide area networks, voice telecommunications systems, data transmission systems, video transmission, basic hardware concepts, and basic software skills. A network administrator should also have: interpersonal skills, including the ability to talk to users in order to service problems and explore new applications. Along with interpersonal skills, a network administrator also needs training skills, which involve the ability to train users or other network support personnel. To make effective use of limited resources, a network administrator should also possess a number of common management skills. For one, the network administrator should have budget management skills, which include knowing how to prepare a budget to justify continuing funds or to request additional funds. Along with those skills, a network administrator needs basic statistical skills, which means that he or she must know how to collect and use system statistics to justify the performance of existing systems or to validate the addition of new ones. Time management skills are also a necessity. These include the ability to manage not only one's own time, but also that of projects and any information technology workers who may be working for the administrator. Just as valuable as time management skills are project management skills, which center on the ability to keep a project on schedule and to use project-estimating tools, projectscheduling tools, and other methods for continuous project assessment. Finally, a network administrator should possess policy creation and enforcement skills, which include the ability to create policies concerning the use of the computer systems, access to facilities, password protection, access to applications, access to databases, distribution of hardware and software, replacement of hardware and software, and the handling of service requests.

____________________ techniques that observe and record some aspect of the user, such as voiceprints, fingerprints, eyeprints, and faceprints, appear to be the wave of the future to replace passwords. *Fill in the blank*

Biometric

____ usually involves having a software program that monitors every transaction within a system. A. Firewalling B. Routing C. Computer auditing D. Access rights

C. Computer auditing

What protocol enables client computers to automatically register their IP addresses to a DNS server? A. Automatic Name Update protocol B. Secure Name Change protocol C. Dynamic DNS update protocol D. DNS Client Update protocol

C. Dynamic DNS update protocol

What password security option ensures that a user must choose new passwords when a password change is required? A. Passwords must meet complexity requirements B. Minimum password age C. Enforce password history D. Maximum password age

C. Enforce password history

____ involves electronically monitoring data flow and system requests into and out of their systems. A. Worms B. Firewalls C. Intrusion detection D. Routers

C. Intrusion detection

What extension of NAT allows several hundred workstations to access the Internet with a single public Internet address? A. Outside Network Address Translation B. Multiple Address Translation C. Port Address Translation D. Network Address Translation

C. Port Address Translation

The first security protocol for wireless LANs was ____. A. IEEE 802.11i B. Wi-Fi Protected Access (WPA) C. Wired Equivalency Protocol (WEP) D. IPsec

C. Wired Equivalency Protocol (WEP)

An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____. A. direct sequence B. frequency hopping C. integrity checking D. time division

C. integrity checking

In ____, a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site. A. e-mail bombing B. smurfing C. pharming D. worming

C. pharming

The intent of SDLC is for ____ not to be disjointed steps in a big plan, but overlapping layers of activity. A. cycles B. rounds C. phases D. levels

C. phases

If you want to transfer data from one point to another, either via a physical wire or through radio waves, the data has to be converted into a(n) ____. A. Unicode B. hertz C. signal D. byte

C. signal

If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____. A. smurfing B. e-mail bombing C. spoofing D. firewalling

C. spoofing

The opposite of asymmetric encryption is ____ encryption, in which one key is used to encrypt and decrypt. A. available key B. asymmetric key C. symmetric D. public key

C. symmetric

A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved. A. monoalphabetic B. polyalphabetic C. transposition-based D. multialphabetic

C. transposition-based

The OSI model layers are (in order from top to bottom) A. Application, Transport, Network, Network Access, Physical B. Presentation, Application, Session, Transport, Data Link, Network, Physical C. Application, Transmission, Data, Network D. Application, Presentation, Session, Transport, Network, Data link, Physical

D. Application, Presentation, Session, Transport, Network, Data link, Physical

____ scanning works by recognizing the unique pattern of a virus. A. Frequency-based B. Time-based C. Amplitude-based D. Signature-based

D. Signature-based

A(n) ____ is the computer program that converts plaintext into an enciphered form. A. worm B. firewall C. Trojan horse D. encryption algorithm

D. encryption algorithm

The ____ includes the time needed to bring the system back up to normal operation. A. mean time between failures B. reliability C. availability D. mean time to repair

D. mean time to repair

Which term best describes a network connection that uses the Internet to give mobile users or branch offices secure access to a company's network resources on a private network? A. tunnel B. direct access C. secure socket D. virtual private network

D. virtual private network

_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties. *Fill in the blank*

Denial of service attacks


संबंधित स्टडी सेट्स

Tableau Desktop Specialist Certification

View Set

Module 6 RAID and Expansion Devices

View Set

Causes of the American Revolution & American Revolution

View Set

Chapter 26 - Monopoly behavior: Second-degree price discrimination

View Set

Expressing feelings with verbs or ed/ing adj.

View Set

Psychology Test: Unit 14 Social Psychology

View Set

Cognitive Psychology Chapter 1 Quiz

View Set