Chapter 10- Networking
Which OSI Reference Model layer uses Media Access Control (MAC) addresses? Device manufacturers assign each hardware device a unique MAC address.
A. Data Link Layer
A _____________ contains rules that define the types of traffic that can come and go through a network.
A. firewall
Network ________ is gathering information about a network for use in a future attack.
A. reconnaissance
The term router describes a device that connects two or more networks and selectively interchanges packets of data between them.
A. true
Which of the following is the definition of hub?
B. A network device that connects network and selectively interchanges packets of data between them.
________ allows the computer to get its configuration information from the network instead of the network administrator providing the configuration information to the computer. It provides a computer with an IP address, subnet mask, and other essential communication information, simplifying the network administrator's job.
B. Dynamic Host Configuration Protocol (DHCP)
8. What term is used to describe a method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address?
B. Network address translation (NAT)
What term is used to describe the current encryption standard for wireless networks?
B. Wi-Fi Protected Access (WPA)
IPv4 addresses are eight-byte addresses that uniquely identify every device on the network.
B. false
he Physical Layer must translate the binary ones and zeros of computer language into the language of the transport medium.
B. false
A ___________ controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network.
B. firewall
A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator is the definition of ________.
B. packet-filtering firewall
Which OSI Reference Model layer is responsible for transmitting information on computers connected to the same local area network (LAN)?
C. Data Link Layer
Which of the following is the definition of network address translation (NAT)?
D. A method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address.
________ is a suite of protocols designed to connect sites securely using IP networks.
D. Internet Protocol Security (IPSec)
What name is given to a protocol to implement a VPN connection between two computers?
D. Point-to-Point Tunneling Protocol (PPTP)
The traceroute command displays the path that a particular packet follows so you can identify the source of potential network problems.
A. true