Communication and Net Security 2nd 40

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is an IP address that is private (ie reserved for internal networks, and not a valid address to use on the internet)? 192.168.42.5 192.166.42.5 192.175.42.5 192.1.42.5

192.168.42.5

A Packet Filtering Firewall is considered what generation? - 1st - 2nd

1st

Which xDSL flavor, appropriate for home or small offices, delivers more bandwidth downstream than upstream and over longer distance?

ADSL

Name a service that is provided by S-RPC?

Authentication

What is the primary difference between FTP and TFTP?

Authentication

Which of the following is NOT a VPN communications protocol standard? -Point to point tunneling protocol -Challenge Handshake Authentication Protocol -Layer 2 Tunneling Protocol -IP Security

Challenge Handshake Authentication Protocol

Authentication Headers (AH) and Encapsulating Security Payload (ESP) protocols are the driving force of IPSec. Authentication Headers (AH) provides the following service except:

Confidentiality

Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided? Data Link Transport Presentation Application

Data Link

One of the following is NOT a characteristic of IPSEC? -Data cannot be read by unauthorized parties -The identity of all IPsec endpoints are confirmed by other endpoints -Data is delivered in the exact order in which it is sent -The number of packets being exchanged can be counted

Data is delivered in the exact order in which it is sent

Which access control method allows the data owner (the person who created the file) to control access to the information they own? DAC- Discretionary MAC - Manatory RBAC - Role-Based NDAC - Non-Discretionary

Discretionary

What is the primary reason why some sites choose not to implement Trivial File Transfer Protocol (TFTP)? - It is too complex to manage user access restrictions under TFTP - Due to the inherent security risks

Due to the inherent security risks.

What is NOT an advantage that TACACS+ has over TACACS?

Evert Logging

Common Data Network service used to share data files and subdirectories on file servers?

File services

Which layer of the DoD TCP\IP model controls the communication flow between hosts? Internet layer Host-to-host transport layer application layer network access layer

Host-to-host transport layer

What is the proper term to refer to a single unit of IP data?

IP datagram

Which layer of the TCP\IP protocol model would best correspond to the OSI\ISO model's network layer? Network Access layer Application layer Host-to-host transport layer Internet layer

Internet Layer

Which of the following statements is NOT true of IPsec transport mode? -It is required for gateways providing access to internal systems -Set-up when end-point is host or communications terminates at end-points -If used in gateway-to-host communication, gateway must act as host -When ESP is used for the security protocol, the hash is only applied to the upper layer protocols contained in the packet

It is required for gateways providing access to internal systems

Which is false: -L2TP is a combination of PPTP and L2F -L2TP and PPTP were designed for single point-to-point client server communication -L2TP operates at the network layer -PPTP uses native PPP authentication and encryption services

L2TP operates at the network layer

What are the 2 Layer 2 sublayers and their IEEE standards?

LLC and MAC; IEEE 802.2 and 802.3

ICMP and IGMP belong to which layer of the OSI model?

Network layer

What is the Secure Electronic Transaction (SET) protocol?

Originated by VISA and MasterCard as an internet credit card protocol using digital signatures.

WOTF is an extension of NAT that permits multiple devices providing services on a LAN to be mapped to a single public IP address? -IP Spoofing -IP subnetting -Port Address translation -IP Distribution

Port address translation

Which OSI layer has a service that negotiates syntax and translates data to and from the transfer syntax for users; which may represent data using different syntaxes?

Presentation

What kind of encryption is realized in the S/MIME-standard?

Public key based, hybrid encryption scheme

Which of the following attacks is also know as Time of check(TOC)/Time of use(TOU)? Eavesdropping Traffic Analysis Masquerading Race Condition

Race Condition

Which of the following protocols is PRIMARILY used to provide confidentiality in a web based application thus protecting data sent across a client machine and server? SSL FTP SSH S/MIME

SSL

Which NAT firewall translation mode offers no protection from hacking attacks to an internal host using this functionality? Network redundancy translation Load balancing translation Dynamic Translation Static Translation

Static Translation

What protocol uses port 69 to transfer files? TFTP SFTP FTP SCP

TFTP

Which is NOT a correct notation for an IPv6 address?

The :: can only appear once in a address.

What is the difference between the Session and Transport layers of the OSI model?

The Transport layer sets up communication between computer systems, while the Session layer sets up connections between applications.

Describe a Class C network:

The first two bits of the IP address would be set to one, and the third bit set to zero.

At a bank every Friday during major deposits you see a series of bits placed in the "Urgent Pointer" field of a TCP packet. This is only 16 bits and concerns you because:

This could be a sign of covert channeling in bank network communications and should be investigated.

In the Open Systems Interconnect (OSI) Reference Model, at what level are TCP and UDP provided? -Transport -Network -Presentation -Application

Transport

In which layer of the OSI model are connection-oriented protocols located in the TCP\IP suite of protocols? Transport layer application layer physical layer network layer

Transport Layer

The ISO/OSI layers do not have which of the following characteristics? - Standard model for network communications - used to gain information from network devices such as count of packets received and routing tables - Enables dissimilar networks to communicate -Defines 7 protocol layers

Used to gain information from network devices such as count of packets received and routing tables

What is not a common weakness of packet filtering firewalls?

Vulnerability to denial-of-service and related attacks.

Which of the following offers security to wireless communications? S-WAP WTLS WSP WDP

WTLS

Which of the following media is MOST resistant to tapping?

fiber optic

The method of multiplexing data where a communication channel is divided into an arbitrary number of variable bit-rate digital channels or data streams. This method allocates bandwidth dynamically to physical channels having information to transmit?

statistical multplexing

What is the process that takes advantage of the security provided by a transmission protocol by carrying one protocol over another?

tunnelling


Set pelajaran terkait

Socialism: core ideas and principles

View Set

[LS 7B] week 8- population ecology

View Set

HESI 4 REVIEW - CRITICAL CARE - MCA 3

View Set

Dictionary/Thesaurus Illuminate Quizizz/Quizlet

View Set