MIS 3317 chapter 4 and 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

NGFWs ________. A) can implement different rules for different applications B) base server decisions on port numbers C) both A and B D) neither A nor B

can implement different rules for different applications

What type of attacker are most attackers today?

career criminals

________ is the general name for malware on a user's PC that collects sensitive information and sends this information to an attacker.

Spyware

Which UTP quality levels are needed to send signals 100 meters at 10 gigabits per second? A) category 6 B) category 6A C) both A and B D) neither A nor B

Category 6A

To manage their Ethernet networks, companies rely on ________.

SNMP

T/F Biometrics, and other new authentication methods, are being created with the goal of getting rid of reusable passwords.

True

T/F In this book, we use the terms Ethernet and 802.3 interchangeably.

True

The strength of a wave is its ________.

amplitude

A spear phishing attack is usually aimed at ________.

an individual

Antivirus programs are designed to detect ________. a) viruses b) worms c) both A and B d) neither A nor B

both A and B

RSTP ________. a) can increase reliability b) was created to break accidental loops c) both A and B d) neither A nor B

both A and B

Which form of authentication depends on the supplicant proving that she knows something only the true party should know? a) reusable password authentication b) iris scanning c) both A and B d) neither A nor B

both A and B

Trunk links connect switches to ________ switches. A) core B) workgroup C) both A and B D) neither A nor B

core

The ability to transmit in two directions simultaneously is ________.

full-duplex communication

T/F All Ethernet switches are manageable.

False

T/F The switch knows the type of device it is forwarding a frame to.

False

________ occurs when the light energies of two pulses arrive at the far end at overlapping times. A) Multimode transmission B) Modal bandwidth C) Modal dispersion D) Modal interference

Modal dispersion

EUI-48 addresses in expressed in hexadecimal notation if used by ________. a) switches b) routers c) both A and B d) neither A nor B

Neither A nor B

________ fiber is being sold today. A) OM2 B) OM4 C) both A and B D) neither A nor B

OM4

Four-pair UTP uses ________ connectors. A) reflection at the two ends B) heat conduction C) radiation D) none of the above

none of the above

A local area network operates ________.

on a customer premises

SPI firewalls are being replaced in large part because they are limited in their ability to detect ________.

port spoofing

The PAD field is added by the ________ if the frame is too short without it. A) sender B) receiver C) both A and B D) neither A nor B

sender

For what specific purpose were the 2.5GBASE-T and 5GBASE-T standards developed? A) general growth in demand for Ethernet speed B) serving access points C) to provide lower-cost service than 10G-BASE-T D) none of the above

serving access points

Traditionally, we have told users that passwords ________.

should have a mix of characters

For sensitive assests, reusable passwords ________.

should not be used

The main benefit of parallel transmission over serial transmission is ________. A) reliability B) speed C) both A and B D) neither A nor B

speed

T/F Hacking is defined as using a computer resource without authorization or in excess of authorization.

FALSE. missing "Intentionally"

In authentication, ________ are the general name for proofs of identity.

credentials

The path a message takes from the source host to the destination device in an Ethernet network is a ________. A) physical link B) data link C) route D) label-switched route

data link

NIST guidelines for reusable passwords permit ________.

entirely lower-case passwords

Ethernet has reliability issues because of its ________. A) too-simple switch operation B) hierarchical organization C) both A and B D) neither A nor B

hierarchical organization

Ethernet became the dominant LAN technology because of ________.

low cost

For reusable passwords, NIST now recommends ________.

that passwords be easy to remember

The 802.11ac Wi-Fi standard uses 256 states. How many bits can it send per clock cycle? A) 8 B) 16 C) 32 D) none of the above

8

________ attackers are often well-funded. A) Disgruntled employee B) Cybercriminal C) both A and B D) neither A nor B

Cybercriminal

Fingerprint recognition is generally acceptable for ________.

laptops

Iris scanning is attractive because of its ________.

precision

________ links connect switches to other switches.

trunk

What is binary 0000 in hex?

0

If you double the number of states, you can transmit ________ more bit(s) per clock cycle.

1

In large Ethernet networks, there can be ________ possible data links between two hosts.

1

How many wires are there is a UTP Ethernet cord?

8

Authentication should generally be ________. A) as strong as possible B) appropriate for a specific resource C) the same for all resources D) different for every different resource

Appropriate for a specific resource

What organization (most specifically) creates Ethernet standards?

IEEE

Requiring someone prove his or her identity is ________.

authentication

In terms of security thinking, "insiders" include ________. a) employees b) many contractors working for the company c) both A and B d) neither A nor B

both A and B

A specific encryption method is called a ________. A) code B) schema C) key method D) cipher

cipher

In SPI firewalls, ACLs are used for packets in the ________ state. A) connection-opening B) ongoing communication C) both A and B D) neither A nor B

connection-opening

In optical fiber, light travels through the ________.

core

What type of switch connects switches to other switches?

core switches

Which of the following can spread very rapidly? A) directly-propagating viruses B) directly-propagating worms C) both A and B D) neither A nor B

directly-propagating viruses

The supplicant is ________. a) the true party b) an impostor c) either A or B d) neither A nor B

either A or B

In Ethernet, switches are organized in a ________.

hierarchy

Using SSL/TLS for Web applications is attractive because SSL/TLS ________.

is essentially free to use

Facial recognition is controversial because ________.

it can be used surreptitiously

Digital certificate authentication fails if the supplicant ________.

learns the true party's private key

Electronic signatures also provide ________ in addition to authentication. A) message integrity B) message encryption C) both A and B D) neither A nor B

message integrity

Modal dispersion limits transmission distance in ________. A) multimode fiber B) single-mode fiber C) both A and B D) neither A nor B

multimode fiber

Cyberwar attacks are made by ________.

national governments

In general, what type of attackers do the most damage?

national governments

You click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see. You exit without looking around. is that hacking?

no

In distributed DoS attacks, the attacker sends messages directly to ________. a) bots b) the intended victim of the DoS attack c) a DOS server d) none of the above

none of the above

The digital certificate provides the ________. A) private key of the supplicant B) private key of the true party C) public key of the supplicant D) none of the above

none of the above

Pieces of code that are executed after the virus or worm has spread are called ________.

payloads

At what layer is the 100BASE-TX standard? A) physical B) data link C) Internet D) physical and data link

physical

Ethernet standards are specified at the ________ layer. a) physical b) Internet c) both A and B d) neither A nor B

physical

UTP and fiber distance limits are for ________. A) physical links B) data link C) Internet routes D) physical and data link

physical links

In binary signaling, there is (are) ________ state(s).

two

A debit card is secure because it requires two credentials for authentication-the card itself and a PIN. This is called ________.

two-factor authentication

You accidentally discover that you can get into other e-mail accounts after you have logged in under your account and only spend a few minutes looking at another user's mail. Is that hacking?

yes

CAT 5e and CAT 6 wiring can carry Ethernet traffic 100 meters up to ________. A) 10 Mbps B) 100 Mbps C) 1 Gbps D) 10 Gbps

1 Gbps

What is 9 hex in binary?

1001

What is binary 0010 in hex?

2

To transmit five bits per clock cycle, you must have ________ states. A) 5 B) 16 C) 32 D) none of the above

32

A system with 16 states can transmit ________ bits per clock cycle A) 3 B) 4 C) 5 D) none of the above

4

If a physical link can use either 4-pair UTP, multimode fiber, or single-mode fiber, which should I use?

4-pair UTP

________ links connect users to workgroup switches. A) Trunk B) Core C) Access D) Workgroup

Access

Ethernet addresses were formerly called ________ addresses.

MAC

Which type of firewall filtering looks at application-layer content?

NGFW

Ethernet standards are specified at the ________ layer. a) physical b) data link c) both A and B d) neither A nor B

both A and B

When a firewall identifies an attack packet, it ________. a) discards the packet b) copies information about the packet into a log file c) both A and B d) neither A nor B

both A and B

Which is more harmful to the victim?

identity theft

A firewall will drop a packet if it ________.

is a definite attack packet

Using RSTP to provide backup links in Ethernet ________. A) is automatic B) is simple C) is challenging D) is impossible

is challenging

Which of the following letters may appear in EUI-48 addresses? a) D b) H c) both A or B d) neither A nor B

neither A nor B

In 4-pair UTP, what is twisted?

pairs of wires

Which of the following attach themselves to other programs? A) viruses B) worms C) both A and B D) neither A nor B

viruses

SSL/TLS is used for ________. A) Web applications B) almost all applications C) both A and B D) neither A nor B

web applications

What type of switch connects users to the network?

workgroup switches

If you see a username and password on a Post-It note that anyone can see on a monitor, is it hacking if you use this information to log in?

yes

You are concerned with the security of a site you use and run a vulnerability test against it. The test reveals a security threat. Is this hacking?

yes

Two switches that are 200 m apart at a speed of 20 Gbps should be connected using ________. A) 10GBASE-SR B) 100GBASE-SR C) 10GBASE-SR with bonding D) 100GBASE-SR with bonding

10GBASE-SR with bonding

What is F hex in binary? A) 1001 B) 1010 C) 1111 D) none of the above

1111

In most encryption, keys must be at least ________ long to be considered safe.

128 bits

What is binary 1111 in hex?

15

What type of copper wiring is widely used in Ethernet?

4-pair UTP

Which core diameter is used in multimode fiber? A) 50 microns B) 8 microns C) 50 mm D) 8 mm

50 microns

To transmit three bits per clock cycle, you must have ________ states.

8

To prevent an unauthorized user from sending supervisory commands to switches, companies use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE

802.1AE

To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use __________. A) 802.1X B) SNMP C) VLANs D) 802.1AE

802.1X

What 802 Working Group creates Ethernet standards? A) 802.1 B) 802.2 C) 802.3 D) 802.11

802.3

Which light wavelength dominates in LANs?

850 nm

Which of the following is used most often in LANs for fiber transmission links? A) 850 nm multimode fiber B) 850 nm single-mode fiber C) 850 nm multimode-mode fiber D) 1,550 nm single-mode fiber

850 nm multimode fiber

Secured packets typically receive ________. a) confidentiality b) authentication c) message integrity d) all of the above

All of the Above

________ look at ________, while ________ mostly look at ________. A) Antivirus programs; packets; firewalls; packets B) Antivirus programs; files; firewalls; files C) Antivirus programs; packets; firewalls; files D) Antivirus programs; files; firewalls; packets

D) Antivirus programs; files; firewalls; packets

________ is the official name for Ethernet addresses.

EUI-48

Which of the following is the most frustrating to use? A) IDSs B) opaque filtering C) SPI firewalls D) NGFW firewalls

IDSs

Who are the most dangerous types of employees?

It security employees

What is the quality designator for multimode optical fiber? A) Cat B) OM C) both A and B D) neither A nor B

OM

4-pair UTP terminates in a(n) ________ connector. A) USB B) RJ-45 C) SC D) standard telephone

RJ-45

________ is the dominant firewall filtering method used on main border firewalls today. A) ACL filtering B) Application content filtering C) Stateful packet inspection D) NGFW

Stateful packet inspection

Which of the following provides security in Ethernet? A) RSTP B) SNMP C) VLANs D) all of the above

VLANs

________ is a program that can capture passwords as you enter them.

a keystroke logger

In antivirus filtering, the best ways to filter currently use ________. A) application awareness B) stateful inspection C) signature detection D) behavioral detection

behavioral detection

Using bodily measurements for authentication is ________. A) illegal B) biometrics C) mandatory for good security D) all of the above

biometrics

In a DDoS attack, a ________ sends messages directly to the victim. A) botmaster B) bot C) command and control server D) all of the above

bot

Employees often attack ________. a) for revenge b) for money c) both A and B d) neither A nor B

both A and B

For reusable passwords, NIST now recommends _________. a) that passwords be easy to remember b) that passwords be long phrases instead of being about 8-12 characters long c) both A and B d) neither A nor B

both A and B

Physical layer standards govern ________. a) signaling b) physical connectors c) both A and B d) neither A nor B

both A and B

The messages of VPNs ________. a) share the same transmission lines used by other VPNs b) are encrypted c) both A and B d) neither A nor B

both A and B

Viruses and worms propagate through ________. a) social engineering b) exploiting vulnerabilities c) both A and B d) neither A nor B

both A and B

Which UTP quality levels can send signals at 10 gigabits per second? a) category 6 b) category 6A c) both A and B d) neither A nor B

both A and B

Which of the following meets the definition of hacking? a) to intentionally use a computer resource without authorization b) to intentionally use a computer on which you have an account but use it for unauthorized purposes c) both A and B d) neither A nor B

both A and B

Who mounts APTs today? a) national governments b) cybercriminals c) both A and B d) neither A nor B

both A and B

Attack programs that can be remotely controlled by an attacker are ________.

bots

Which of the following can be upgraded after it is installed on a victim computer (choose the most specific answer)?

bots

In digital certificate authentication, the verifier gets the key it needs directly from the ________. A) supplicant B) verifier C) true party D) certificate authority

certificate authority

Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________. A) authentication B) confidentiality C) both A and B D) neither A nor B

confidentiality

In an SPI firewall, all rules except the last will permit the connection. The last will ________.

deny the connection

When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall, the firewall ________.

drops the packet

Firewall log files should be read ________.

every day

To span the distance between two switches, why is adding an intermediate switch not an attractive choice?

expense

Advanced persistent threats are ________.

extremely dangerous for the victim

Optical fiber cords use two strands ________. A) for reliability through redundancy B) to form a complete electrical loop C) to double the transmission speed D) for full-duplex transmission

for full-duplex transmission

Ethernet messages are ________.

frames

Optical fiber cords typically have two fiber strands. This is done to allow ________. A) redundancy B) total redundancy C) half-duplex operation D) full-duplex operation

full-duplex operation

In which type of attack does the attacker gather extensive sensitive personal information about its victim?

identity theft

Compared to NGFWs, IDSs ________. A) look for different threats B) look for the same threats C) look for the same threats but do so differently D) none of the above

look for different threats

SPI firewalls are attractive because of their ________.

low cost

Ethernet standards are specified at the ________ layer. a) Internet b) transport c) both A and B d) neither A nor B

neither A nor B

Trojan horses can spread by ________. a) e-mailing themselves to victim computers b) directly propagating to victim computers c) both A and B d) neither A nor B

neither A nor B

If a packet is highly suspicious but not a provable attack packet, an ________ may drop it.

none of the above

How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP segment that contains an acknowledgement?

pass it if it is part of an approved connection

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually ________.

passes the packet

The two tag frames provide information about ________.

priority

UTP categories rate the ________ of UTP cabling. A) quality B) speed C) quality-of-service performance D) error performance

quality

What problem limits transmission distance in 4-pair UTP? A) reflection at the two ends B) heat conduction C) radiation D) none of the above

radiation

In a ________ attack, the attacker encrypts some or all of the victim's hard drive.

ransom

DoS attacks attempt to ________.

reduce the availability of a computer

Having only a single possible path between devices ________.

reduces switching cost

If you can span the distance between two switches with either a single optical fiber link or two UTP lengths with an intermediate switch, which should you choose?

single optical fiber link

Fiber that has a core diameter of 8.3 microns is ________.

single-mode fiber

The longest transmission distances are possible with ________. A) USB B) UTP C) single-mode fiber D) multimode fiber

single-mode fiber

In authentication, the ________ is the party trying to prove his or her identity.

supplicant

Ethernet forwarding devices are ________.

switches

When a user attempts to plug into an Ethernet switch protected by 802.1X, ________.

the user will be required to authenticate himself or herself

850 nm multimode fiber is used in LANs ________. A) to keep cost low B) to have the longest transmission distances C) both A and B D) neither A nor B

to keep costs low

Signal state is held constant in a clock cycle ________.

to make it easier for the receiver to sample the state

The distance between two corresponding points in adjacent cycles is the ________. A) frequency B) wavelength C) bandwidth D) span

wavelength

Stateful packet inspection firewalls are attractive because of their ________.

low cost for a given traffic volume

How long (in milliseconds) is a clock cycle if I transmit 400 Mbps with four states?

.000005

Which of the following sometimes uses direct propagation between computers? A) viruses B) worms C) Trojan horses D) downloaders

worms

Which type of firewall filtering collects streams of packets to analyze them as a group? A) SPI B) NGFW C) both A and B D) neither A nor B

NGFW

Which type of firewall is more expensive per packet handled?

NGFW

Which of the following is used most often in LANs for fiber transmission links? A) modal bandwidth fiber B) 1.550 nm fiber C) single-mode fiber D) multimode fiber

multimode fiber

T/F A switch knows the entire data link between the source and destination hosts.

False

________ are full programs.

Worms

In encryption, what must be kept secret?

the key

In digital certificate authentication, the supplicant encrypts the challenge message with ________. A) the supplicant's private key B) the verifier's private key C) the true party's private key D) none of the above

the supplicant's private key

The supplicant claims to be ________.

the true party

In digital certificate authentication, the verifier decrypts the challenge message with ________. A) the supplicant's private key B) the true party's private key C) the supplicant's public key D) the true party's public key

the true party's public key

________ attacks typically extend over a period of months. A) DDoS B) Malware C) APT D) Spear phishing

APTs

________ describe light entering a fiber's core at different angles. A) Co-cycle waves B) Harmonics C) Divergences D) Different modes

Different modes

The ARP cache gives the ________ of a router the host will send a packet to. A) IP address B) EUI-48 address C) MAC address D) host name

EUI-48 address

After an ARP cache poisoning attack, the ARP cache gives the ________.

EUI-48 address of the router the MITM attacker

Electronic signatures provide message-by-message ________.

authentication

In general, what should an employer do whenever an employee leaves the firm?

Their accounts should be disabled instantly

Why are employees especially dangerous?

They are trusted

Malware programs that masquerade as system files are called ________.

Trojan Horses

ARP cache poisoning is ________. A) a DoS attack B) a DDoS attack C) an illegal login attack D) a man-in-the middle attack

a man-in-the-middle attack

In digital signaling, there is (are) ________ state(s). A) one B) only two C) a small number of D) an infinite number of

a small number of


Set pelajaran terkait

Chapter 32: Assessment of Hematologic Function and Treatment Modalities

View Set

Accounting Vocabulary terms chapters 3 & 4

View Set