MIS 3317 Quiz 2
What is binary 0010 in hex?
2
To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use __________. A) 802.1X B) SNMP C) VLANs D) 802.1AE
802.1X
Secured packets typically receive ________. a) confidentiality b) authentication c) message integrity d) all of the above
All of the Above
Authentication should generally be ________. A) as strong as possible B) appropriate for a specific resource C) the same for all resources D) different for every different resource
Appropriate for a specific resource
Which UTP quality levels are needed to send signals 100 meters at 10 gigabits per second? A) category 6 B) category 6A C) both A and B D) neither A nor B
Category 6A
Which of the following is the most frustrating to use? A) IDSs B) opaque filtering C) SPI firewalls D) NGFW firewalls
IDSs
T/F In SNMP, the manager communicates directly with the managed device
False
T/F Priority is a way to handle a chronic lack of capacity.
False
T/F The switch knows the type of device it is forwarding a frame to.
False
________ can be addressed by using priority. A) Chronic lacks of capacity B) Momentary traffic peaks C) both A and B D) neither A nor B
Momentary traffic peaks
Which type of firewall filtering looks at application-layer content?
NGFW
EUI-48 addresses in expressed in hexadecimal notation if used by ________. a) switches b) routers c) both A and B d) neither A nor B
Neither A nor B
What is the quality designator for multimode optical fiber? A) Cat B) OM C) both A and B D) neither A nor B
OM
________ fiber is being sold today. A) OM2 B) OM4 C) both A and B D) neither A nor B
OM4
For what specific purpose were the 2.5GBASE-T and 5GBASE-T standards developed? A) general growth in demand for Ethernet speed B) serving access points C) to provide lower-cost service than 10G-BASE-T D) none of the above
serving access points
Traditionally, we have told users that passwords ________.
should have a mix of characters
Signal state is held constant in a clock cycle ________.
to make it easier for the receiver to sample the state
What is binary 1111 in hex?
15
________ is a flaw in a program that permits a specific attack or set of attacks. A) Malware B) A security error C) A vulnerability D) A security fault
a vulnerability
Attack programs that can be remotely controlled by an attacker are ________.
bots
ISPs usually offer QoS guarantees to ________. A) residential customers B) business customers C) both A and B D) neither A nor B
business customers
The Target attackers sold stolen card information to ________. A) crimeware shops B) card shops C) card counterfeiters D) all of the above
card shops
What organization (most specifically) creates Ethernet standards?
IEEE
________ are full programs.
Worms
Employees often attack ________. a) for revenge b) for money c) both A and B d) neither A nor B
both A and B
In Ethernet, switches are organized in a ________.
hierarchy
The supplicant claims to be ________.
the true party
What type of switch connects users to the network?
workgroup switches
Trunk links connect switches to ________ switches. A) core B) workgroup C) both A and B D) neither A nor B
core
________ describe light entering a fiber's core at different angles. A) Co-cycle waves B) Harmonics C) Divergences D) Different modes
Different modes
The 802.11ac Wi-Fi standard uses 256 states. How many bits can it send per clock cycle? A) 8 B) 16 C) 32 D) none of the above
8
To transmit three bits per clock cycle, you must have ________ states.
8
To prevent an unauthorized user from sending supervisory commands to switches, companies use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE
802.1AE
Which light wavelength dominates in LANs?
850 nm
Using bodily measurements for authentication is ________. A) illegal B) biometrics C) mandatory for good security D) all of the above
biometrics
In a DDoS attack, a ________ sends messages directly to the victim. A) botmaster B) bot C) command and control server D) all of the above
bot
Antivirus programs are designed to detect ________. a) viruses b) worms c) both A and B d) neither A nor B
both A and B
Jitter is a problem for ________. a) voice over IP (VoIP) b) streaming media c) both A and B d) neither A nor B
both A and B
Which of the following meets the definition of hacking? a) to intentionally use a computer resource without authorization b) to intentionally use a computer on which you have an account but use it for unauthorized purposes c) both A and B d) neither A nor B
both A and B
What type of attacker are most attackers today?
career criminals
A specific encryption method is called a ________. A) code B) schema C) key method D) cipher
cipher
Creating routing tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control
control
What type of switch connects switches to other switches?
core switches
Which is more harmful to the victim?
identity theft
SDN holds the promise of bringing ________. A) lower cost B) lower agility C) both A and B D) neither A nor B
lower cost
The business benefit of multiplexing is ________. A) lower cost B) higher speed C) avoiding the need to send many transmission links through narrow conduits D) security
lower cost
If throughput falls substantially below a QoS guaranteed speed, the ISP ________. A) always pays a penalty B) may pay a penalty C) does not pay a penalty D) may renegotiate the QoS guarantee for speed
may pay a penalty
If a packet is highly suspicious but not a provable attack packet, an ________ may drop it.
none of the above
The strength of a wave is its ________.
amplitude
The supplicant is ________. a) the true party b) an impostor c) either A or B d) neither A nor B
either A or B
NIST guidelines for reusable passwords permit ________.
entirely lower-case passwords
To span the distance between two switches, why is adding an intermediate switch not an attractive choice?
expense
Guarantees for quality of service are called ________. A) QoS-G B) QoS metrics C) SLAs D) QoS guarantees
SLAs
Facial recognition is controversial because ________.
it can be used surreptitiously
Fingerprint recognition is generally acceptable for ________.
laptops
SNMP agents communicate with the ________. A) network visibility program B) network management program C) MIB D) all of the above
network management program
Four-pair UTP uses ________ connectors. A) reflection at the two ends B) heat conduction C) radiation D) none of the above
none of the above
How did the Target attackers obtain the stolen information? a) directly from the POS terminals b) from the vendor service server c) from the POS software download server d) none of the above
none of the above
In distributed DoS attacks, the attacker sends messages directly to ________. a) bots b) the intended victim of the DoS attack c) a DOS server d) none of the above
none of the above
The digital certificate provides the ________. A) private key of the supplicant B) private key of the true party C) public key of the supplicant D) none of the above
none of the above
To determine if a host is reachable, you send a(n) ________. A) SNMP SET command B) MIB C) trap D) ping
ping
Which of the following sometimes uses direct propagation between computers? A) viruses B) worms C) Trojan horses D) downloaders
worms
An SLA specifies the ________. A) best case B) worst case C) both A and B D) neither A nor B
worst case
In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps. The throughput is half the rated speed. If each person downloading is getting an average of 200Mbps, how many people are using the Internet at that moment? A) 10 B) 5 C) 2 D) none of the above
5
What type of copper wiring is widely used in Ethernet?
4-pair UTP
Which core diameter is used in multimode fiber? A) 50 microns B) 8 microns C) 50 mm D) 8 mm
50 microns
________ attacks typically extend over a period of months. A) DDoS B) Malware C) APT D) Spear phishing
APTs
A spear phishing attack is usually aimed at ________.
an individual
Who mounts APTs today? a) national governments b) cybercriminals c) both A and B d) neither A nor B
both A and B
NGFWs ________. A) can implement different rules for different applications B) base server decisions on port numbers C) both A and B D) neither A nor B
can implement different rules for different applications
In optical fiber, light travels through the ________.
core
In authentication, ________ are the general name for proofs of identity.
credentials
In an SPI firewall, all rules except the last will permit the connection. The last will ________.
deny the connection
Which of the following can spread very rapidly? A) directly-propagating viruses B) directly-propagating worms C) both A and B D) neither A nor B
directly-propagating viruses
Firewall log files should be read ________.
every day
Ethernet has reliability issues because of its ________. A) too-simple switch operation B) hierarchical organization C) both A and B D) neither A nor B
hierarchical organization
Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________. A) rated speed B) aggregate throughput C) individual throughput D) all of the above
individual throughput
Users typically can eliminate a vulnerability in one of their programs by ________.
installing a patch
A firewall will drop a packet if it ________.
is a definite attack packet
An SLA specifies _______. A) maximum latency B) minimum latency C) both A and B D) neither A nor B
maximum latency
Electronic signatures also provide ________ in addition to authentication. A) message integrity B) message encryption C) both A and B D) neither A nor B
message integrity
Latency is usually measured in ________. A) bits per second (bps) B) milliseconds (ms) C) minutes of downtime D) none of the above
milliseconds (ms)
UTP and fiber distance limits are for ________. A) physical links B) data link C) Internet routes D) physical and data link
physical links
To manage their Ethernet networks, companies rely on ________.
SNMP
T/F In this book, we use the terms Ethernet and 802.3 interchangeably.
True
Transmission speed is normally measured in ________. A) bits per second B) bytes per second C) octets per second D) none of the above
bits per second
The damage of momentary traffic peaks can be addressed by ________. a) using priority b) adding more capacity c) both A and B d) neither A nor B
both A and B
The messages of VPNs ________. a) share the same transmission lines used by other VPNs b) are encrypted c) both A and B d) neither A nor B
both A and B
Traffic shaping may ________ traffic that is undesirable. a) prohibit b) limit c) both A and B d) neither A nor B
both A and B
Using the SNMP Set command ________. a) saves management labor b) requires excellent security c) both A and B d) neither A nor B
both A and B
When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall, the firewall ________.
drops the packet
In general, what type of attackers do the most damage?
national governments
Using standard configurations ________. A) saves money B) gives management agility C) both A and B D) neither A nor B
saves money
Momentary traffic peaks usually last a few ________ or less. A) milliseconds B) seconds C) minutes D) hours
seconds
In ________ thinking, the opponent is primarily an intelligent attacker.
security
The PAD field is added by the ________ if the frame is too short without it. A) sender B) receiver C) both A and B D) neither A nor B
sender
The longest transmission distances are possible with ________. A) USB B) UTP C) single-mode fiber D) multimode fiber
single-mode fiber
850 nm multimode fiber is used in LANs ________. A) to keep cost low B) to have the longest transmission distances C) both A and B D) neither A nor B
to keep costs low
Forwarding functions are located in routers in ________. A) traditional operation B) SDN C) both A and B D) neither A nor B
traditional operation
Control is done on individual switches and routers in ________. A) traditional operation B) SDN C) both A and B D) neither A nor B
traditional operations
In large Ethernet networks, there can be ________ possible data links between two hosts.
1
Two switches that are 200 m apart at a speed of 20 Gbps should be connected using ________. A) 10GBASE-SR B) 100GBASE-SR C) 10GBASE-SR with bonding D) 100GBASE-SR with bonding
10GBASE-SR with bonding
What is F hex in binary? A) 1001 B) 1010 C) 1111 D) none of the above
1111
How long (in milliseconds) is a clock cycle if I transmit 400 Mbps with four states?
.000005
What is binary 0000 in hex?
0
If you double the number of states, you can transmit ________ more bit(s) per clock cycle.
1
CAT 5e and CAT 6 wiring can carry Ethernet traffic 100 meters up to ________. A) 10 Mbps B) 100 Mbps C) 1 Gbps D) 10 Gbps
1 Gbps
In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. If you and three others are transmitting or receiving at the same time, what speed should you expect to get? A) 0.5 Mbps B) 1 Mbps C) 1.25 Mbps D) none of the above
1.25 Mbps
What is 9 hex in binary?
1001
To transmit five bits per clock cycle, you must have ________ states. A) 5 B) 16 C) 32 D) none of the above
32
A system with 16 states can transmit ________ bits per clock cycle A) 3 B) 4 C) 5 D) none of the above
4
________ links connect users to workgroup switches. A) Trunk B) Core C) Access D) Workgroup
Access
________ attackers are often well-funded. A) Disgruntled employee B) Cybercriminal C) both A and B D) neither A nor B
Cybercriminal
The ARP cache gives the ________ of a router the host will send a packet to. A) IP address B) EUI-48 address C) MAC address D) host name
EUI-48 address
After an ARP cache poisoning attack, the ARP cache gives the ________.
EUI-48 address of the router the MITM attacker
QoS is quantified through ________. A) criteria B) consensus C) metrics D) none of the above
Metrics
Which type of firewall filtering collects streams of packets to analyze them as a group? A) SPI B) NGFW C) both A and B D) neither A nor B
NGFW
Which type of firewall is more expensive per packet handled?
NGFW
The SNMP ________ command changes how managed devices operate. A) Get B) Set C) both A and B D) neither A nor B
Set
________ is the general name for malware on a user's PC that collects sensitive information and sends this information to an attacker.
Spyware
________ is the dominant firewall filtering method used on main border firewalls today. A) ACL filtering B) Application content filtering C) Stateful packet inspection D) NGFW
Stateful packet inspection
In general, what should an employer do whenever an employee leaves the firm?
Their accounts should be disabled instantly
Why are employees especially dangerous?
They are trusted
________ is a program that can capture passwords as you enter them.
a keystroke logger
ARP cache poisoning is ________. A) a DoS attack B) a DDoS attack C) an illegal login attack D) a man-in-the middle attack
a man-in-the-middle attack
In digital signaling, there is (are) ________ state(s). A) one B) only two C) a small number of D) an infinite number of
a small number of
________ is the general name for a security flaw in a program. A) A virus B) Malware C) A security fault D) A vulnerability
a vulnerability
In antivirus filtering, the best ways to filter currently use ________. A) application awareness B) stateful inspection C) signature detection D) behavioral detection
behavioral detection
Which of the following is NOT governed by the SNMP standard? a) agents b) MIB c) network management program d) network visibility program
network visibility program
A local area network operates ________.
on a customer premises
How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP segment that contains an acknowledgement?
pass it if it is part of an approved connection
When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually ________.
passes the packet
Pieces of code that are executed after the virus or worm has spread are called ________.
payloads
What problem limits transmission distance in 4-pair UTP? A) reflection at the two ends B) heat conduction C) radiation D) none of the above
radiation
DoS attacks attempt to ________.
reduce the availability of a computer
Having only a single possible path between devices ________.
reduces switching cost
Which of the following probably suffered the most financial damage from the Target breach?
retailers
Ping tells you ________. a) latency b) round-trip latency c) cumulative latency to each router along the route d) none of the above
round-trip latency
In QoS, the S stands for ________. A) software B) security C) service D) satisfaction
service
Adding applications that cannot tolerate jitter may require ________. A) switch upgrades B) improved switch management C) improved security D) all of the above
switch upgrades
For reusable passwords, NIST now recommends ________.
that passwords be easy to remember
In binary signaling, there is (are) ________ state(s).
two
A debit card is secure because it requires two credentials for authentication-the card itself and a PIN. This is called ________.
two-factor authentication
If you see a username and password on a Post-It note that anyone can see on a monitor, is it hacking if you use this information to log in?
yes
You accidentally discover that you can get into other e-mail accounts after you have logged in under your account and only spend a few minutes looking at another user's mail. Is that hacking?
yes
If you have 10 sites connected by 7 transmission links, how many rows of traffic data will you have in your traffic table? A) 7 B) 10 C) 14 D) 20
10
In most encryption, keys must be at least ________ long to be considered safe.
128 bits
If a physical link can use either 4-pair UTP, multimode fiber, or single-mode fiber, which should I use?
4-pair UTP
If you have 10 sites connected by 7 transmission links, how many columns will you have in your traffic table? A) 7 B) 10 C) 14 D) 20
7
How many wires are there is a UTP Ethernet cord?
8
What 802 Working Group creates Ethernet standards? A) 802.1 B) 802.2 C) 802.3 D) 802.11
802.3
Which of the following is used most often in LANs for fiber transmission links? A) 850 nm multimode fiber B) 850 nm single-mode fiber C) 850 nm multimode-mode fiber D) 1,550 nm single-mode fiber
850 nm multimode fiber
________ is the percentage of time that a network is available for use. A) Availability B) Downtime C) QoS D) none of the above
Availability
________ look at ________, while ________ mostly look at ________. A) Antivirus programs; packets; firewalls; packets B) Antivirus programs; files; firewalls; files C) Antivirus programs; packets; firewalls; files D) Antivirus programs; files; firewalls; packets
D) Antivirus programs; files; firewalls; packets
________ is the official name for Ethernet addresses.
EUI-48
T/F A switch knows the entire data link between the source and destination hosts.
False
T/F All Ethernet switches are manageable.
False
Who are the most dangerous types of employees?
It security employees
Variability in delay is called ________. A) jitter B) variance C) a QoS failure D) latency
Jitter
________ occurs when the light energies of two pulses arrive at the far end at overlapping times. A) Multimode transmission B) Modal bandwidth C) Modal dispersion D) Modal interference
Modal dispersion
4-pair UTP terminates in a(n) ________ connector. A) USB B) RJ-45 C) SC D) standard telephone
RJ-45
In SDN, which device manages the control function for individual devices? A) SNMP manager console B) forwarding device itself C) SDN policy server D) SDN controller
SDN controller
Which of the following tells you the cumulative round-trip latency to each router along the route to the host? A) Ping B) Traceroute C) both A and B D) neither A nor B
Traceroute
Malware programs that masquerade as system files are called ________.
Trojan Horses
T/F Biometrics, and other new authentication methods, are being created with the goal of getting rid of reusable passwords.
True
Which of the following provides security in Ethernet? A) RSTP B) SNMP C) VLANs D) all of the above
VLANs
To handle momentary traffic peaks, which would you give higher priority to? A) e-mail B) VoIP C) both A and B D) It is impossible to say with the information provided.
VoIP
In SDN, applications ________. A) increase network management labor B) are required to make SDN work effectively C) both A and B D) neither A nor B
are required to make SDN work effectively
SNMP Get commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B
ask agents for information about the managed device
Electronic signatures provide message-by-message ________.
authentication
Requiring someone prove his or her identity is ________.
authentication
Ethernet standards are specified at the ________ layer. a) physical b) data link c) both A and B d) neither A nor B
both A and B
For reusable passwords, NIST now recommends _________. a) that passwords be easy to remember b) that passwords be long phrases instead of being about 8-12 characters long c) both A and B d) neither A nor B
both A and B
In terms of security thinking, "insiders" include ________. a) employees b) many contractors working for the company c) both A and B d) neither A nor B
both A and B
Momentary traffic peaks can lead to ________. a) latency b) packet loss c) both A and B d) neither A nor B
both A and B
Physical layer standards govern ________. a) signaling b) physical connectors c) both A and B d) neither A nor B
both A and B
Ping tells you ________. a) that a host is reachable b) latency in the connection to the host c) both A and B d) neither A nor B
both A and B
RSTP ________. a) can increase reliability b) was created to break accidental loops c) both A and B d) neither A nor B
both A and B
SDN can ________. a) permit routing rules to be changed rapidly b) reduce router costs c) both A and B d) neither A nor B
both A and B
Viruses and worms propagate through ________. a) social engineering b) exploiting vulnerabilities c) both A and B d) neither A nor B
both A and B
When a firewall identifies an attack packet, it ________. a) discards the packet b) copies information about the packet into a log file c) both A and B d) neither A nor B
both A and B
Which UTP quality levels can send signals at 10 gigabits per second? a) category 6 b) category 6A c) both A and B d) neither A nor B
both A and B
Which form of authentication depends on the supplicant proving that she knows something only the true party should know? a) reusable password authentication b) iris scanning c) both A and B d) neither A nor B
both A and B
Which of the following can be upgraded after it is installed on a victim computer (choose the most specific answer)?
bots
In digital certificate authentication, the verifier gets the key it needs directly from the ________. A) supplicant B) verifier C) true party D) certificate authority
certificate authority
SNMP Set commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B
change router operation
Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________. A) authentication B) confidentiality C) both A and B D) neither A nor B
confidentiality
In SPI firewalls, ACLs are used for packets in the ________ state. A) connection-opening B) ongoing communication C) both A and B D) neither A nor B
connection-opening
Creating switching tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control
control
Which of the following were able to recoup most of the money they lost from Target?
credit card companies
The path a message takes from the source host to the destination device in an Ethernet network is a ________. A) physical link B) data link C) route D) label-switched route
data link
SNMP network management ________. A) increases total cost B) does not affect total cost C) decreases total cost D) causes arthritis
decreases total cost
The Target attackers probably first broke into Target using the credentials of a(n) ________.
employee in a firm outside Target
Advanced persistent threats are ________.
extremely dangerous for the victim
Optical fiber cords use two strands ________. A) for reliability through redundancy B) to form a complete electrical loop C) to double the transmission speed D) for full-duplex transmission
for full-duplex transmission
Routing packets is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control
forwarding
Ethernet messages are ________.
frames
The ability to transmit in two directions simultaneously is ________.
full-duplex communication
Optical fiber cords typically have two fiber strands. This is done to allow ________. A) redundancy B) total redundancy C) half-duplex operation D) full-duplex operation
full-duplex operation
Error rates can soar when the network traffic level is at a(n) ________. A) high level B) fluctuating level C) unregulated level D) none of the above
high level
In which type of attack does the attacker gather extensive sensitive personal information about its victim?
identity theft
The SNMP manager stores the information it receives from Get commands ________. A) in the MIB B) on the agent C) on the managed device D) in the cloud
in the MIB (Management Information Base)
Using RSTP to provide backup links in Ethernet ________. A) is automatic B) is simple C) is challenging D) is impossible
is challenging
Using SSL/TLS for Web applications is attractive because SSL/TLS ________.
is essentially free to use
When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________. A) latency B) output C) jitter D) throughput
latency
Digital certificate authentication fails if the supplicant ________.
learns the true party's private key
Compared to NGFWs, IDSs ________. A) look for different threats B) look for the same threats C) look for the same threats but do so differently D) none of the above
look for different threats
Ethernet became the dominant LAN technology because of ________.
low cost
SPI firewalls are attractive because of their ________.
low cost
Stateful packet inspection firewalls are attractive because of their ________.
low cost for a given traffic volume
The general term for evil software is ________.
malware
________ is the most frequent type of company attack.
malware
Compared to priority, overprovisioning capacity can reduce ________. A) equipment cost B) management labor C) both A and B D) neither A nor B
management labor
An SLA specifies ______. A) maximum jitter B) minimum jitter C) both A and B D) neither A nor B
maximum jitter
An SLA specifies __________. A) maximum availability B) minimum availability C) both A and B D) neither A nor B
minimum availability
An SLA specifies the _________. A) maximum speed B) minimum speed C) both A and B D) neither A nor B
minimum speed
Modal dispersion limits transmission distance in ________. A) multimode fiber B) single-mode fiber C) both A and B D) neither A nor B
multimode fiber
Which of the following is used most often in LANs for fiber transmission links? A) modal bandwidth fiber B) 1.550 nm fiber C) single-mode fiber D) multimode fiber
multimode fiber
Trunk Lines in the Internet core are ________. A) dedicated B) multiplexed C) both A and B D) neither A nor B
multiplexed
Cyberwar attacks are made by ________.
national governments
Ethernet standards are specified at the ________ layer. a) Internet b) transport c) both A and B d) neither A nor B
neither A nor B
Jitter is a problem for ________. a) downloading a file attached to an e-mail b) e-mail c) both A and B d) neither A nor B
neither A nor B
Trojan horses can spread by ________. a) e-mailing themselves to victim computers b) directly propagating to victim computers c) both A and B d) neither A nor B
neither A nor B
Which of the following letters may appear in EUI-48 addresses? a) D b) H c) both A or B d) neither A nor B
neither A nor B
You click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see. You exit without looking around. is that hacking?
no
Which of the following reduces momentary traffic peaks by controlling how much traffic is allowed into the network? a) overprovisioning b) priority c) QoS guarantees D) none of the above
none of the above
Communication between SDN applications and SDN controllers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B
northbound APIs
In 4-pair UTP, what is twisted?
pairs of wires
At what layer is the 100BASE-TX standard? A) physical B) data link C) Internet D) physical and data link
physical
Ethernet standards are specified at the ________ layer. a) physical b) Internet c) both A and B d) neither A nor B
physical
SPI firewalls are being replaced in large part because they are limited in their ability to detect ________.
port spoofing
Iris scanning is attractive because of its ________.
precision
The two tag frames provide information about ________.
priority
Which of the following usually has higher availability? A) data networks B) public switched telephone network (PSTN) C) Both of the above usually have equal availability. D) neither A nor B
public switched telephone network (PSTN)
UTP categories rate the ________ of UTP cabling. A) quality B) speed C) quality-of-service performance D) error performance
quality
In a ________ attack, the attacker encrypts some or all of the victim's hard drive.
ransom
For sensitive assests, reusable passwords ________.
should not be used
If you can span the distance between two switches with either a single optical fiber link or two UTP lengths with an intermediate switch, which should you choose?
single optical fiber link
Fiber that has a core diameter of 8.3 microns is ________.
single-mode fiber
What kind of attack is most likely to succeed against a system with no technological vulnerabilities?
social engineering
Communication between SDN controllers and routers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B
southbound APIs
Routers and switches must support ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B
southbound APIs
The main benefit of parallel transmission over serial transmission is ________. A) reliability B) speed C) both A and B D) neither A nor B
speed
In authentication, the ________ is the party trying to prove his or her identity.
supplicant
Ethernet forwarding devices are ________.
switches
In SDN, a switch receives its forwarding table rules directly from ________. A) the SDN controller B) an SDN management application C) another switch D) an SNMP manager
the SDN controller
For consumers who suffered credit card fraud because of the Target breach and acted quickly, which of the following is true?
the credit card companies did not charge them for fraudulent purchasers
In encryption, what must be kept secret?
the key
For analysis, network administrators usually interact primarily with ________. A) agents B) the MIB C) the network management program D) the network visualization program
the network visualization program
Throughput is ________. A) the speed a network actually provides to users B) a network's rated speed C) both A and B D) neither A nor B
the speed a network actually provides to users
In digital certificate authentication, the supplicant encrypts the challenge message with ________. A) the supplicant's private key B) the verifier's private key C) the true party's private key D) none of the above
the supplicant's private key
In digital certificate authentication, the verifier decrypts the challenge message with ________. A) the supplicant's private key B) the true party's private key C) the supplicant's public key D) the true party's public key
the true party's public key
When a user attempts to plug into an Ethernet switch protected by 802.1X, ________.
the user will be required to authenticate himself or herself
SNMP agents can initiate ________. A) Get commands B) traps C) both A and B D) neither A nor B
traps
________ links connect switches to other switches.
trunk
Which of the following attach themselves to other programs? A) viruses B) worms C) both A and B D) neither A nor B
viruses
The distance between two corresponding points in adjacent cycles is the ________. A) frequency B) wavelength C) bandwidth D) span
wavelength
SSL/TLS is used for ________. A) Web applications B) almost all applications C) both A and B D) neither A nor B
web applications
You are concerned with the security of a site you use and run a vulnerability test against it. The test reveals a security threat. Is this hacking?
yes
Vulnerability-based attacks that occur before a patch is available are called ________ attacks. A) indefensible B) stealth C) malware D) zero-day
zero-day
Ethernet addresses were formerly called ________ addresses.
MAC
T/F Hacking is defined as using a computer resource without authorization or in excess of authorization.
FALSE. missing "Intentionally"