Midterm IS435
50) The UDP header has ________ fields. A) 4 B) 8 C) 16 D) 32
A) 4
Which of the following is an Internet supervisory protocol? A) DNS B) IP C) both A and B D) neither A nor B
A) DNS
199) ________ stop definite attack packets. A) Firewalls B) IDSs C) both A and B D) neither A nor B
A) Firewalls
________ have DHCP servers. A) Home access routers B) Internet core routers C) both A and B D) neither A nor B
A) Home access routers
48) Which of the following is a connectionless protocol? A) IP B) TCP C) both A and B D) neither A nor B
A) IP
11) Routing is based on a(n) ________. A) IP address B) single-network address C) either A or B D) neither A nor B
A) IP address
27) A standards agency for OSI is ________. A) ITU-T B) IETF C) both A and B D) neither A nor B
A) ITU-T
161) To manage their Ethernet networks, companies rely on ________. A) SNMP B) HTTP C) FTTH D) none of the above
A) SNMP
44) If a destination host receives a correct segment, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing
A) an ACK segment
52) On a server, well-known port numbers indicate ________. A) applications B) connections with client computers C) both A and B D) neither A nor B
A) applications
196) Desktop (tabletop) rehearsals are important because they ________ compared to live rehearsals. A) are relatively inexpensive B) get into specific details C) both A and B D) neither A nor B
A) are relatively inexpensive
88) SNMP Get commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B
A) ask agents for information about the managed device
149) In optical fiber, light travels through the ________. A) core B) cladding C) both A and B
A) core
116) In authentication, ________ are the general name for proofs of identity. A) credentials B) authorizations C) digital certificates D) all of the above
A) credentials
47) If the destination internet process detects an error, it ________. A) discards the packet B) sends back a segment notifying the sender C) both A and B D) neither A nor B
A) discards the packet
94) Routing packets is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control
A) forwarding
97) Users typically can eliminate a vulnerability in one of their programs by ________. A) installing a patch B) using an antivirus program C) both A and B D) neither A nor B
A) installing a patch
121) A firewall will drop a packet if it ________. A) is a definite attack packet B) is a highly probable attack packet C) both A and B D) neither A nor B
A) is a definite attack packet
114) Using SSL/TLS for Web applications is attractive because SSL/TLS ________. A) is essentially free to use B) offers the strongest possible cryptographic protections C) both A and B D) neither A nor B
A) is essentially free to use
73) When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________. A) latency B) output C) jitter D) throughput
A) latency
158) Ethernet became the dominant LAN technology because of ________. A) low cost B) high speed C) link reliability D) agility
A) low cost
91) Using standard configurations ________. A) saves money B) gives management agility C) both A and B D) neither A nor B
A) saves money
53) The range of port 1024 to port 4999 is the usual range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B
B Ephemeral
16) In a point-to-point single network, how many physical links will there be when a packet is transmitted? A) 0 B) 1 C) 2 D) We cannot say with the information provided.
B) 1
69) In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps. The throughput is half the rated speed. If each person downloading is getting an average of 200Mbps, how many people are using the Internet at that moment? A) 10 B) 5 C) 2 D) none of the above
B) 5
12) Paths across a single network are called ________. A) routes B) data links C) physical links D) none of the above
B) data links
172) Vulnerabilities are occasionally found in even the best security products. Consequently, companies must specifically ________. A) outsource security B) have defense in depth C) do risk analysis D) only give minimum permissions
B) have defense in depth
70) Trunk lines in the Internet core are ________. A) dedicated B) multiplexed C) both A and B D) neither A nor B
B) multiplexed
138) To transmit three bits per clock cycle, you must have ________ states. A) 3 B) 6 C) 8 D) 16
C) 8
132) What 802 Working Group creates Ethernet standards? A) 802.1 B) 802.2 C) 802.3 D) 802.11
C) 802.3
189) The policy server creates ________. A) DMZs B) policies C) ACLs for individual firewalls D) standards that firewalls must follow
C) ACLs for individual firewalls
135) ________ links connect users to workgroup switches. A) Trunk B) Core C) Access D) Workgroup
C) Access
109) Who are the most dangerous types of employees? A) financial employees B) manufacturing employees C) IT security employees D) former employees
C) IT security employees
7) What process adds a header in front of a TCP segment? A) Application B) Transport C) Internet D) Data Link
C) Internet
75) Guarantees for quality of service are called ________. A) QoS-G B) QoS metrics C) SLAs D) QoS guarantees
C) SLAs
42) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. A) ACK B) SYN C) SYN/ACK D) none of the above
C) SYN/ACK
45) In a four-step close, which side transmits a FIN segment? A) the side that initiates the close B) the side that does not initiate the close C) both A and B D) neither A nor B
C) both A and B
51) UDP ________. A) is unreliable B) has a checksum field C) both A and B D) neither A nor B
C) both A and B
81) Momentary traffic peaks can lead to ________. A) latency B) packet loss C) both A and B D) neither A nor B
C) both A and B
83) Traffic shaping may ________ traffic that is undesirable. A) prohibit B) limit C) both A and B D) neither A nor B
C) both A and B
86) Ping tells you ________. A) that a host is reachable B) latency in the connection to the host C) both A and B D) neither A nor B
C) both A and B
90) Using the SNMP Set command ________. A) saves management labor B) requires excellent security C) both A and B D) neither A nor B
C) both A and B
9) The transport layer on the destination host ________. A) reassembles the application message if it has been fragmented B) removes the transport header C) both A and B D) neither A nor B
C) both A and B are the answer
25) Network standards provide ________. A) strobing B) synchronization C) interoperability D) entanglement
C) interoperability
95) The general term for evil software is ________. A) virus B) worm C) malware D) all of the above
C) malware
167) Security is primarily about ________. A) technology B) planning C) management D) none of the above
C) management
65) QoS is quantified through ________. A) criteria B) consensus C) metrics D) none of the above
C) metrics
37) At what layer, will you find standards for routes? A) application B) data link C) transport D) Internet
D) Internet
93) Creating switching and routing tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control
D) control
171) An attacker must break through two firewalls to get to a host. This most specifically illustrates the ________ principle. A) comprehensive security B) risk assurance C) weakest link protection D) defense in depth
D) defense in depth
13) If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12
2
141) How long (in milliseconds) is a clock cycle if I transmit 400 Mbps with four states? A) 0.000005 B) 0.0025 C) 0.005 D) none of the above
A) 0.000005
140) If you double the number of states, you can transmit ________ more bit(s) per clock cycle. A) 1 B) 2 C) 4 D) none of the above
A) 1
18) A host sends a packet to another host containing seven single networks along the way. How many other hosts will there be along the route when Host A transmits? A) 1 B) 2 C) 7 D) 9
A) 1
39) If two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 7
A) 1
A host sends a packet to another host containing six single networks along the way. How many routes are included in this transmission? A) 1 B) 6 C) 7 D) 8
A) 1
IPv4 addresses are ________ bits long. A) 32 B) 64 C) 128 D) none of the above
A) 32
153) If a physical link can use either 4-pair UTP, multimode fiber, or single-mode fiber, which should I use? A) 4-pair UTP B) multimode fiber C) single-mode fiber D) none of the above
A) 4-pair UTP
164) To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE
A) 802.1X
105) ________ is a program that can capture passwords as you enter them. A) A keystroke logger B) Data mining software C) both A and B D) neither A nor B
A) A keystroke logger
72) ________ is the percentage of time that a network is available for use. A) Availability B) Downtime C) QoS D) none of the above
A) Availability
54) The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server
A) Client
127) Which of the following is the most frustrating to use? A) IDSs B) opaque filtering C) SPI firewalls D) NGFW firewalls
A) IDSs
136) ________ links connect switches to other switches. A) Trunk B) Long C) Access D) Workgroup
A) Trunk
46) Which of the following is NOT one of the three general parts of messages? A) address field B) header C) data field D) trailer
A) address field
150) The strength of a wave is its ________. A) amplitude B) frequency C) wavelength D) force
A) amplitude
111) Electronic signatures provide message-by-message ________. A) authentication B) confidentiality C) both A and B D) neither A nor B
A) authentication
182) There should be relatively free access ________. A) between the Internet and the DMZ B) between the DMZ and the firm's internal network C) both A and B D) neither A nor B
A) between the Internet and the DMZ
66) Transmission speed is normally measured in ________. A) bits per second B) bytes per second C) octets per second D) none of the above
A) bits per second
5) When you use your tablet to access the internet, the tablet is a ________. A) client host B) server host C) both A and B D) neither A nor B
A) client host
130) Ethernet messages are ________. A) frames B) packets C) segments D) not named
A) frames
170) Attackers only need to find a single weakness to break in. Consequently, companies must ________. A) have comprehensive security B) have insurance C) do risk analysis D) only give minimum permissions
A) have comprehensive security
89) The SNMP manager stores the information it receives from Get commands ________. A) in the MIB B) on the agent C) on the managed device D) in the cloud
A) in the MIB
74) Variability in delay is called ________. A) jitter B) variance C) a QoS failure D) latency
A) jitter
179) On sensitive resources, authenticated parties should get ________. A) least permissions B) standard permissions C) no permissions D) maximum permissions
A) least permissions
22) Stateful packet inspection firewalls are attractive because of their ________. A) low cost for a given traffic volume B) ability to base rules on specific application programs C) both A and B D) neither A nor B
A) low cost for a given traffic volume
78) An SLA specifies ________. A) maximum latency B) minimum latency C) both A and B D) neither A nor B
A) maximum latency
152) Modal dispersion limits transmission distance in ________. A) multimode fiber B) single-mode fiber C) both A and B D) neither A nor B
A) multimode fiber
180) Companies should have ________ for each site. A) multiple security domains B) a single security domain C) at least two DMZs D) multiple DMZs
A) multiple security domains
191) Normal incidents are handled by the ________. A) on-duty staff B) CSIRT (computer security incident response team) C) outside consultant D) FBI
A) on-duty staff
178) Another term for authorization is ________. A) permission B) authentication C) scope D) establishing the creator of a file
A) permission
33) At what layer, will you find standards for access points? A) physical B) data link C) both A and B D) neither A nor B
A) physical B) data link C) both A and B answer is C
188) Which of the following MUST be followed? A) standards B) guidelines C) both A and B D) neither A nor B
A) standards
67) Throughput is ________. A) the speed a network actually provides to users B) a network's rated speed C) both A and B D) neither A nor B
A) the speed a network actually provides to users
156) 850 nm multimode fiber is used in LANs ________. A) to keep cost low B) to have the longest transmission distances C) both A and B D) neither A nor B
A) to keep cost low
186) Oversight activities include ________. A) vulnerability testing B) creating guidelines C) both A and B D) neither A nor B
A) vulnerability testing
187) Attacking your own firm occurs in ________. A) vulnerability testing B) auditing C) both A and B D) neither A nor B
A) vulnerability testing
173) There is a single countermeasure in ________. A) weakest links B) defense in depth C) both A and B D) neither A nor B
A) weakest links
184) A policy specifies ________. A) what should be done B) how to do it C) both A and B D) neither A nor B
A) what should be done
71) The business benefit of multiplexing is ________. A) lower cost B) higher speed C) avoiding the need to send many transmission links through narrow conduits D) security
Answer: A
113) The messages of VPNs ________. A) share the same transmission lines used by other VPNs B) are encrypted C) both A and B D) neither A nor B
Answer: C
49) If someone says that a 1-bit flag is set, it is given the value ________. A) 0 B) 1 C) either 0 or 1 D) neither 0 or 1
B) 1
60) Convert decimal 8 to binary. A) 100 B) 1000 C) 10000 D) 111
B) 1000
159) What is 9F hex in binary? A) 10001101 B) 10011111 C) 10101111 D) 11111001
B) 10011111
160) What is binary 0010 in hex? A) 1 B) 2 C) 3 D) none of the above
B) 2
63) The five senses can be represented with a ________-bit field. A) 2 B) 3 C) 4 D) 5
B) 3
139) A system with 16 states can transmit ________ bits per clock cycle A) 3 B) 4 C) 5 D) none of the above
B) 4
142) What type of copper wiring is widely used in Ethernet? A) optical fiber B) 4-pair UTP C) both A and B D) neither A nor B
B) 4-pair UTP
19) A host sends a packet to another host containing six single networks along the way. How many data links are used for this transmission? A) 1 B) 6 C) 7 D) 8
B) 6
21) A host sends a packet to another host with six single networks along the way. How many frames are involved? A) 1 B) 6 C) 7 D) 8
B) 6
177) ________ are actions people can take on a resource. A) Provisions B) Authorizations C) Authentications D) Risks
B) Authorizations
56) "Octet" is the same as ________. A) "bit" B) "byte" C) either A or B, depending on the context D) neither A nor B
B) Byte
192) Major incidents are handled by the ________. A) on-duty staff B) CSIRT (computer security incident response team) C) outside consultant D) FBI
B) CSIRT (computer security incident response team)
200) ________ focus on suspicious packets. A) Firewalls B) IDSs C) both A and B D) neither A nor B
B) IDSs
26) Which standards agency is especially important for internet processes? A) ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B is important.
B) IETF
32) At what layer, will you find standards for routers? A) transport B) Internet C) both A and B D) neither A nor B
B) Internet
80) ________ can be addressed by using priority. A) Chronic lacks of capacity B) Momentary traffic peaks C) both A and B D) neither A nor B
B) Momentary traffic peaks
126) Which type of firewall filtering looks at application-layer content? A) stateful packet inspection B) NGFW C) both A and B D) neither A nor B
B) NGFW
17) Which of the following is true? A) Frames are carried inside packets. B) Packets are carried inside frames. C) both A and B D) neither A nor B
B) Packets are carried inside frames.
144) 4-pair UTP terminates in a(n) ________ connector. A) USB B) RJ-45 C) SC D) standard telephone
B) RJ-45
55) The destination socket is 60.171.18.22:161. The destination host is a(n) ________. A) client B) server C) well-known server D) ephemeral server
B) Server
82) To handle momentary traffic peaks, which would you give higher priority to? A) e-mail B) VoIP C) both A and B D) It is impossible to say with the information provided.
B) VoIP
100) ________ are full programs. A) Viruses B) Worms C) both A and B D) neither A nor B
B) Worms
193) CSIRT leaders should come from ________. A) an outside crisis vendor B) a business department C) the security department D) the IT department
B) a business department
115) Requiring someone prove his or her identity is ________. A) confidentiality B) authentication C) authorization D) both B and C
B) authentication
175) Allowing a user access to edit files in a specific directory is an example of ________. A) authentication B) authorizations C) defense in depth D) network segregation
B) authorizations
106) In a DDoS attack, a ________ sends messages directly to the victim. A) botmaster B) bot C) command and control server D) all of the above
B) bot
79) ISPs usually offer QoS guarantees to ________. A) residential customers B) business customers C) both A and B D) neither A nor B
B) business customers
148) Which UTP quality levels are needed to send signals 100 meters at 10 gigabits per second? A) category 6 B) category 6A C) both A and B D) neither A nor B
B) category 6A
87) SNMP Set commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B
B) change router operation
10) Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________. A) authentication B) confidentiality C) both A and B D) neither A nor B
B) confidentiality
134) What type of switch connects switches to other switches? A) trunk switches B) core switches C) workgroup switches D) none of the above
B) core switches
The IETF primarily ________. A) manages the Internet B) creates Internet standards C) coordinates the work of ISPs D) all of the above
B) creates Internet standards
131) The path a message takes from the source host to the destination device in an Ethernet network is a ________. A) physical link B) data link C) route D) label-switched route
B) data link
34) At what layer, will you find standards for switches? A) application B) data link C) transport D) Internet
B) data link
35) At what layer, will you find standards for frames? A) application B) data link C) transport D) Internet
B) data link
38) At what layer, will you find standards for EUI-48 addresses? A) application B) data link C) transport D) Internet
B) data link
107) Advanced persistent threats are ________. A) inexpensive for the attacker B) extremely dangerous for the victim C) both A and B D) neither A nor B
B) extremely dangerous for the victim
22) Source and destination EUI-48 (or MAC) addresses are found in ________ headers. A) IP B) frame C) TCP D) UDP
B) frame
146) The ability to transmit in two directions simultaneously is ________. A) parallel communication B) full-duplex communication C) both A and B D) neither A nor B
B) full-duplex communication
197) Live rehearsals are important because they ________ compared to desktop rehearsals. A) are relatively inexpensive B) get into specific details C) both A and B D) neither A nor B
B) get into specific details
118) Digital certificate authentication fails if the supplicant ________. A) is the true party B) learns the true party's private key C) learns the true party's public key D) either B or C
B) learns the true party's private key
77) An SLA specifies ________. A) maximum speed B) minimum speed C) both A and B D) neither A nor B
B) minimum speed
84) SNMP agents communicate with the ________. A) network visibility program B) network management program C) MIB D) all of the above
B) network management program
124) How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP segment that contains an acknowledgement? A) process it through the Access Control List (ACL) B) pass it if it is part of an approved connection C) both A and B D) neither A nor B
B) pass it if it is part of an approved connection
28) Which layer governs wires? A) transport B) physical C) Internet D) none of the above
B) physical
117) Iris scanning is attractive because of its ________. A) low cost B) precision C) both A and B D) neither A nor B
B) precision
168) Which phase of the plan-protect-respond cycle takes the largest amount of work? A) plan B) protect C) respond D) The phases require about equal amounts of effort.
B) protect
8) When a frame arrives, the data link process on the destination host ________. A) adds a header B) removes a header C) both A and B D) neither A nor B
B) removes a header
169) Balancing threats against protection costs is called ________. A) economic justification B) risk analysis C) comprehensive security D) The Illusion of Cost
B) risk analysis
181) DMZs are places for ________. A) servers that are not accessible to clients outside the firm B) servers that are freely accessible to clients outside the firm C) servers that are freely accessible to clients inside the firm D) servers that are inaccessible to any clients
B) servers that are freely accessible to clients outside the firm
99) What kind of attack is most likely to succeed against a system with no technological vulnerabilities? A) malware B) social engineering C) both A and B D) neither A nor B
B) social engineering
147) The main benefit of parallel transmission over serial transmission is ________. A) reliability B) speed C) both A and B D) neither A nor B
B) speed
6) What process adds a header in front of an application message or fragment? A) application B) transport C) internet D) data link
B) transport
57) Ethernet has a Frame Check Sequence Field to check for errors. Ethernet is ________. A) reliable B) unreliable C) both A and B D) neither A nor B
B) unreliable
76) An SLA specifies the ________. A) best case B) worst case C) both A and B D) neither A nor B
B) worst case
68) In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. If you and three others are transmitting or receiving at the same time, what speed should you expect to get? A) 0.5 Mbps B) 1 Mbps C) 1.25 Mbps D) none of the above
C) 1.25 Mbps
154) Two switches that are 200 m apart at a speed of 20 Gbps should be connected using ________. A) 10GBASE-SR B) 100GBASE-SR C) 10GBASE-SR with bonding D) 100GBASE-SR with bonding
C) 10GBASE-SR with bonding
61) A 5-bit field can represent ________ alternatives or different combinations. A) 8 B) 16 C) 32 D) 64
C) 32
40) If two hosts are connected by five networks, how many routers will there be when one host sends a packet to the other host? A) 1 B) 2 C) 4 D) 5
C) 4
62) To represent 65 alternatives, your alternatives field would have to be at least ________ bits long. A) 5 B) 6 C) 7 D) 8
C) 7
104) ________ is the general name for malware on a user's PC that collects sensitive information and sends this information to an attacker. A) A keystroke logger B) Anti-privacy software C) Spyware D) Data mining software
C) Spyware
174) A central firewall management program that specifically pushes changes to firewalls is ________. A) a weakest link B) defense in depth C) a single point of takeover D) risk analysis thinking
C) a single point of takeover
108) Employees often attack ________. A) for revenge B) for money C) both A and B D) neither A nor B
C) both A and B
120) When a firewall identifies an attack packet, it ________. A) discards the packet B) copies information about the packet into a log file C) both A and B D) neither A nor B
C) both A and B
129) Ethernet standards are specified at the ________ layer. A) physical B) data link C) both A and B D) neither A nor B
C) both A and B
137) Physical layer standards govern ________. A) signaling B) physical connectors C) both A and B D) neither A nor B
C) both A and B
163) Rapid Spanning Tree Protocol (RSTP) ________. A) can increase reliability B) was created to break accidental loops C) both A and B D) neither A nor B
C) both A and B
185) Policies should drive ________. A) implementation B) oversight C) both A and B D) neither A nor B
C) both A and B
190) Successful attacks are called ________. A) breaches B) compromises C) both A and B D) neither A nor B
C) both A and B
198) Real-time fail-over with synchronized data centers ________. A) is expensive B) minimizes downtime C) both A and B D) neither A nor B
C) both A and B
31) Which layer(s) governs transmission through a single network? A) data link B) physical C) both A and B D) neither A nor B
C) both A and B
92) SDN can ________. A) permit routing rules to be changed rapidly B) reduce router costs C) both A and B D) neither A nor B
C) both A and B
ISPs ________. A) carry traffic on the Internet B) connect users to the Internet C) both A and B D) neither A nor B
C) both A and B
195) CSIRTs rehearse an incident by talking about what should be done without actually doing it in ________. A) simulations B) live rehearsals C) desktop rehearsals (also called tabletop rehearsals) D) none of the above
C) desktop rehearsals (also called tabletop rehearsals)
58) Converting application messages into bits is called ________. A) encapsulation B) encryption C) encoding D) exchange
C) encoding
157) In Ethernet, switches are organized in a ________. A) ring B) mesh C) hierarchy D) any of the above
C) hierarchy
23) When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually ________. A) drops the packet B) drops the packet and notifies an administrator C) passes the packet D) passes the packet, but notifies an administrator
C) passes the packet
125) SPI firewalls are being replaced in large part because they are limited in their ability to detect ________. A) NAT B) piggybacking C) port spoofing D) none of the above
C) port spoofing
103) In a ________ attack, the attacker encrypts some or all of the victim's hard drive. A) virus B) DoS C) ransom D) lock
C) ransom
64) In QoS, the S stands for ________. A) software B) security C) service D) satisfaction
C) service
155) The longest transmission distances are possible with ________. A) USB B) UTP C) single-mode fiber D) multimode fiber
C) single-mode fiber
119) A debit card is secure because it requires two credentials for authentication-the card itself and a PIN. This is called ________. A) segmentation B) redundancy C) two-factor authentication D) none of the above
C) two-factor authentication
14) If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12
D) 12
1) If two hosts are connected by five switches, how physical links will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 6
D) 6
59) Transmitting "Oh, My!" without the quotes in ASCII requires ________ octets. A) 2 B) 4 C) 6 D) 7
D) 7
143) How many wires are there in a 4-pair UTP Ethernet cord? A) 1 B) 2 C) 4 D) 8
D) 8
165) To prevent an unauthorized user from sending supervisory commands to switches, companies use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE
D) 802.1AE
96) ________ is the general name for a security flaw in a program. A) A virus B) Malware C) A security fault D) A vulnerability
D) A vulnerability
128) ________ look at ________, while ________ mostly look at ________. A) Antivirus programs; packets; firewalls; packets B) Antivirus programs; files; firewalls; files C) Antivirus programs; packets; firewalls; files D) Antivirus programs; files; firewalls; packets
D) Antivirus programs; files; firewalls; packets
151) ________ describe light entering a fiber's core at different angles. A) Co-cycle waves B) Harmonics C) Divergences D) Different modes
D) Different modes
166) After an ARP cache poisoning attack, the ARP cache gives the ________. A) IP address of the router the user wishes to send to B) EUI-48 address of the router the user wishes to send to C) IP address of the router the MITM attacker D) EUI-48 address of the router the MITM attacker
D) EUI-48 address of the router the MITM attacker
36) At what layer, will you find standards for IP addresses? A) application B) data link C) transport D) Internet
D) Internet
Who owns the Internet? A) The U.S. Government B) The United Nations C) The IETF D) No one
D) No one
101) Malware programs that masquerade as system files are called ________. A) viruses B) scripts C) root malware D) Trojan horses
D) Trojan horses
112) Secured packets typically receive ________. A) confidentiality B) authentication C) message integrity D) all of the above
D) all of the above
194) Which department will almost always be involved in a CSIRT? A) the IT department B) the legal department C) the human resources department D) all of the above
D) all of the above
183) It is hardest to create good security ________. A) policies B) procedures C) processes D) culture
D) culture
145) Optical fiber cords use two strands ________. A) for reliability through redundancy B) to form a complete electrical loop C) to double the transmission speed D) for full-duplex transmission
D) for full-duplex transmission
2) We call any device connected to the Internet a(n) ________. A) IP B) client C) router D) host
D) host
176) If someone has been properly authenticated, they should receive ________ permissions. A) all B) no C) maximum D) minimum
D) minimum
30) Which standards layer governs multiuser word processing programs? A) data link B) transport C) Internet D) none of the Above
D) none of the Above
29) Which standards layer governs e-mail? A) data link B) transport C) Internet D) none of the above
D) none of the above
43) If a destination host receives a TCP segment with an error, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing
D) nothing
102) Pieces of code that is executed after the virus or worm has spread are called ________. A) vulnerabilities B) exploits C) compromises D) payloads
D) payloads
5) To determine if a host is reachable, you send a(n) ________. A) SNMP SET command B) MIB C) trap D) ping
D) ping
133) What type of switch connects users to the network? A) user switches B) core switches C) access switches D) workgroup switches
D) workgroup switches
98) Vulnerability-based attacks that occur before a patch is available are called ________ attacks. A) indefensible B) stealth C) malware D) zero-day
D) zero-day
24) Internet standards are published as ________. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols
RFCs