ISEC Final ch.10
True
True or False: A subnet mask of a network is based on IP address?
captive portal
A captive portal is a webpage that is displayed for all new connections to provide a logon page for your wireless network.
LAN (Local Area Network)
A collection of computers that are connected to one another or to a common medium. All computers are generally within an area no larger than a building.
router
A device that connects two or more networks and selectively interchanges packets of data based on predetermined routes or path determinations.
screened subnet
A firewall device that has 3 NICs. One NIC connects to the internet, the second connects to the internal network, and the third connects to a DMZ
packet-filtering firewall
A firewall that examines each packet it receives and compares that packet to a list of rules. Has no memory of packets.
stateful inspection firewall
A firewall that examines the state of a connection as well as a simple address, port, and protocol rules to determine how to process a packet.
media access control address (MAC)
A hardware address that uniquely identifies each node of a network.
ICMP (Internet Control Message Protocol)
A management protocol for IP networks
NAT
A method of IP address to hide a system's actual, internal IP address.
firewall
A program or dedicated hardware device that inspects network traffic passing through it and denies or permits that traffic based on a set of rules you determine at configuration.
PPTP
A protocol to implement a VPN connection between two computers.
Fibre channel
A storage networking protocol originally used in supercomputers to connect storage devices.
unified threat management (UTM)
Devices used to provide filtering, plus many additional security services.
1 .WiFi (CORRECT) 2. 4G 3. 3G 4. Digital Subscriber Line (DSL)1.
Gary is configuring a Smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity?
443 HTTP over SSL
Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication?
presentation layer
On the OSI reference model: Data format; encryption
transport layer
On the OSI reference model: End-to-end communication maintenance
data link layer
On the OSI reference model: Physical addressing; LAN delivery
Session layer
On the OSI reference model: Process-to-process communication
network layer
On the OSI reference model: Routing data; logical addressing; WAN delivery
application layer
On the OSI reference model: User interface
IPSec
Protects IP packets from disclosure or change.
Firewall (CORRECT) Hub Switch Router
Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?
NIC
This is the physical interface between a computer and the ethernet LAN. It contains a unique 6-byte MAC-layer address.
True
True or False: A network attacker wants to know IP addresses used on a network, remote access procedures, and weaknesses in network systems.
False: Stateful Inspection
True or False: A packet-filtering firewall remembers information about the status of a network communication.
False: NAT
True or False: ICMP is a method of IP address assignment that uses an alternate, public IP address to hide systems real IP address?
False: 32 or 128 bits
True or False: IP addresses are eight-byte addresses that uniquely identify every device on the network.
False: Loop protection
True or False: Implicit deny is when a firewall looks at message address to determine whether a message is being sent around an unending loop?
False: Session Layer
True or False: The Transport Layer of OSL Reference Model creates, maintain, and disconnect communication that take place between processes over the network.
True
True or False: The physical layer of OSI model translates the binary one and zeros of computer language to the language of the transport medium?
True
True or False: The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.
Virtual LAN(VLAN)
Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?
DHCP
What protocol is responsible for assigning IP addresses to hosts on most networks?
True
True or False: The three main categories of network security risk are reconnaissance, eavesdropping and denial of service
1. Wireless network access (CORRECT) 2. Content inspection 3. Malware inspection 4. URL filtering
What is NOT a service commonly offered by unified threat management(UTM) devices?
VLAN
A method of encrypting IP packets from one end to another. As in a tunnel.
NAC
A method to restrict access to a network based on identity or other rules.
smurf attack
A network attack in which forged ICMP echo request packets are sent to UP brodcast addresses from remote locations to generate DoS attacks.
OSI model
An internationally accepted framework of standards that govern how separate computer systems communicate using networks.
Packet filtering firewall
What type of firewall has no memory of packets it has encountered in the past and must make decisions for each packet it receives?
Physical Data Link Network Transport Session Presentation Application
What are the 7 layers?
Simple Mail Transfer Protocol
What does SMTP stand for?
switch
A network device that connects network segments, creating a direct connection between a sending and receiving port.
hub
A network device that connects network segments, echoing all received traffic to all other ports.
DHCP (Dynamic Host Configuration Protocol)
Allows each computer to get its configuration information dynamically from the network instead of the network administrator providing the configuration information to the computer.
application proxy firewall
An advanced firewall that process all traffic between two systems. Instead of allowing a direct connection between two systems, the proxy connects to each system separately and passes filtered traffic to the destination based on filtering rules.