MIS687 Chapter 4, 10-12 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Ch. 11 Which may NOT be a 'major' security threat for the Wi-Fi LAN? A. wardriving B. ARP spoofing attack C. rogue wireless access point D. man-in-the-middle attack

B. ARP spoofing attack

Ch.11 DOS attacks are intended to compromise a system's ________. A. confidentiality B. availability C. integrity D. privacy E. authenticity

B. Availability

Ch. 4 Which signal conversion device is placed between the border router and the T-1 WAN line, if any? A. codec B. CSU/DSU C. switch D. digital converter E. modem

B. CSU/DSU

Ch.11 MAC address flooding by an attacker is a form of the __________ attack. A. Malware B. Denial of Service C. spoofing D. Password cracking

B. Denial of Service

The X.509 standard issued by ITU (International Telecommunications Union) defines a _______standard. A. Digital signature B. Digital certificate C. Public Key D. Private Key

B. Digital certificate

Ch. 12 Which protocol information may be the LEAST used by the firewall filter packets? A. IP (internet protocol) B. HTTPS protocol C. TCP (Transport control protocol) D. ICMP (internet control message protocol)

B. HTTPS protocol

Ch. 4 Compared with optical fibers, twisted pairs: A. Have a larger bandwidth B. Have a higher interference C. Have a higher segment length D. Have a lower attenuation

B. Have a higher interference

Ch. 10 Which VPN requires additional purchase and installation of security software in user computers? A. SSL in the tunnel mode B. IPSec in the transport mode C. IPSec in the tunnel mode D. IPSec in the site-to-site mode E. SSL in the regular mode

B. IPSec in the transport mode

Ch.11 Choose an INCORRECT statement regarding spoofing. A. Spoofing and masquerading are synonymous. B. MAC spoofing is damaging because it shuts down WiFi NICs. C. IP spoofing is used to conceal the sources of DOS attacks. D. Email spoofing is used much by spammers. E. Phishing is used much to draw traffic to spoofed websites.

B. MAC spoofing is damaging because it shuts down WiFi NICs

Ch. 4 If a digital device should transmit data over the analog signaling line (ex. telephone line) what physical layer device should be used? A. decoder B. Modem C. CSU/DSU D. Multiplexer

B. Modem

Ch. 12 Which is CORRECT in describing the DMZ? A. The DMZ and production networks generally belong to a single subnet. B. SMTP email and HTTP web servers are frequently placed in the DMZ. C. The DMZ and production networks should be physically separated. D. Servers in the DMZ should use public IP addresses. E. The border router is unable to perform NAT when the DNZ is set up.

B. SMTP email and HTTP web servers are frequently placed in the DMZ.

Ch. 10 Which statement describes the IPv6 standard? A. Using a security protocol will become an option. B. Each packet's payload should be less than 50KB. C. IPv6 packets have a simpler header structure than IPv4 packets. D. Unicasting, multicasting, and broadcasting are supported by IPv6. E. SSL is a security protocol preferred by IPv6.

C. IPv6 packets have simpler header structure than IPv4 packets

Ch. 10 Which INCORRECTLY describes IPv6 addressing? A. An address is composed of two parts: 64-bit network ID and 64-bit host ID. B. Host addresses can be configured manually. C. IPv6 supports broadcasting of IP packets as IPv4 does. D. Host addresses can be dynamically provided through the DHCP service. E. The 64-bit host ID of a computer can be derived from its 48-bit MAC address.

C. IPv6 supports broadcasting of IP packets as IPv4 does

Ch. 10 ________ is a popular security standard built into web browsers. A. Secure shell (SSH) B. Point-to-point tunneling protocol (PPTP) C. SSL D. Secure electronic transaction (SET) E. IPSec

C. SSL

Ch.11 Flooding the ________ is a popular approach to trigger DOS on a target server. Assume that the ICMP on the target server has been disabled. A. ARP request B. traceroute message C. SYN request D. telnet message E. DNS request

C. SYN request

Ch. 10 ________ represents the process of encapsulating a packet within another packet and is heavily used for VPN. A. Binding B. Packing C. Tunneling D. Bonding E. Trunking

C. Tunneling

Ch. 12 Choose a CORRECT statement on the WPA standard. A. WPA provides the most advanced WiFi security. B. WPA comes only in the enterprise mode that uses central authentication servers. C. WPA's encryption key in a WiFi network changes periodically. D. WPA's official standard is IEEE802.11i. E. WPA is as weak as WEP in protecting WiFi networks.

C. WPA's encryption key in a WiFi network changes periodically.

Ch. 12 The WPA standard has one major advantage over WAP2. What can it be? A. WPA offers stronger authentication than WPA2. B. WPA offers better quality of service than WPA2. C. Wireless NICs that support WEP can be upgraded to WPA, but not to WPA2. D. WPA has been standardized by IEEE but WPA2 has not. E. WPA is supported by more WiFi standards including 802.11g and 802.11n than WPA2.

C. Wireless NICs that support WEP can be upgraded to WPA, but not to WPA2.

Ch.4 Modulation is used when A. a node produces text data/signal and the delivery channel relies on analog signaling. B. a node produces sound data/signal and the delivery channel relies on digital signaling. C. a node produces digital data/signal and the delivery channel relies on analog signaling. D. a node produces digital data/signal and the delivery channel relies on digital signaling. E. a node produces digital or analog data/signal and the delivery channel relies on digital signaling.

C. a node produces digital data/signal and the delivery channel relies on analog signaling

Ch. 12 Improving host security through antivirus software and a firewall is ________. A. host firewalling B. host self-defense C. host hardening D. host patching E. host demilitarizing

C. host hardening

Ch. 10 The ________ is a junction point that joins ISP networks together to enable packet routing over the Internet. A. gateway B. internet switching point C. internet exchange point D. internet service point E. internet portal

C. internet exchange point

Ch. 4 The fiber-optic cable use uses ___________ signaling a. multiple-level voltage b. two-level voltage c. on and off d. analog e. electronic

C. on and off

Ch. 4 When a signal travels, it is called ______________ A. proliferation B. advertising C. propagation D. delegation

C. propagation

Ch.11 When an IP packet with a spurious source IP address is crafted in an attempt to bypass a firm's firewall, it is a form of ________. A. phishing B. sniffing C. spoofing D. fingerprinting E. backdooring

C. spoofing

Ch. 4 Which is INCORRECT about DS hierarchies? A. DS (digital signal) is an international standard. B. STM is the international standard of DS hierarchy for optical fibers. C. The base speed of DS is 1.54Mbps, and higher speeds are its multiples. D. OC is the North American standard for optical fibers. E. The base speed of OC is 51.84Mbps, and higher speeds are its multiples.

C. the base speed of DS is 1.54Mbps,and higher speeds are its multiples

Ch. 10 The IPSec technology can be deployed in ____________ modes: A. site-to-site and transport B. tunnel and site-to-site C. tunnel and transport D. transport and remote access

C. tunnel and transport

Ch. 4 Which represents key properties of the analog wave? A. bandwidth, amplitude, frequency B. frequency, wavelength, bandwidth C. wavelength, frequency, amplitude D. attenuation, amplitude, wavelength E. attenuation, amplitude, frequency

C. wavelength, frequency, amplitude

Ch. 11 When an attacker sets up his/her WNIC to broadcast a continuous stream of CTS frames, this should result in: A. MITM attack B. wardriving attack C. zombie AP attack D. DOS attack E. port scanning attack

D. DOS Attack

Ch.4 Choose a FALSE statement regarding the wiring (or telecommunications) closet: A. It is connecting between horizontal cabling and backbone cabling B. It houses intermediary devices to connect end stations in the adjacent area C. It has one or more patch panels that are normally rack-mounted D. It is generally located on the bottom floor of a building E. It simplifies cable management within a building

D. It generally located on the bottom floor of a building

Ch. 11 One key attribute that separates worms from other malware is: A. it is designed to monitor system usage B. It destroys a computer's hardware C. It is designed to create a backdoor on an infected system D. It is designed to replicate itself without interventions

D. It is designed to replicate itself without interventions

Ch. 4 Which is CORRECT regarding the fiber-optic cable? A. The cable's properties are defined at the data link layer. B. The cable does not require repeaters to boost signal strength. C. Carriers normally use multimode fibers to develop their backbone infrastructure. D. It uses light signals to move data. E. It is the most popular medium for the access link that connects a host to a switch.

D. It uses light signals to move data

Ch.11 When a computer's NIC is in the promiscuous mode, it can perform ________ better. A. brute force attack B. DOS attack C. dictionary attack D. packet sniffing E. IP address spoofing

D. Packet sniffing

Ch. 12 Which is CORRECTLY paired in terms of security requirements and technology solutions? A. data confidentiality _____ ACL B. data integrity _____ anti-spyware C. access control _____ FCS D. authentication _____ digital signature E. access control _____ cryptography

D. authentication _____ digital signature

Ch. 12 Cryptography can be a tool for: A. confidentiality and authentication B. authentication and integrity C. integrity and confidentiality D. confidentiality, authentication, and integrity E. confidentiality

D. confidentiality, authentication, and integrity

Ch. 11 The "dictionary method" is used to ____________: A. spoof web addresses B. sniff packets C. trigger man-in-the-middle attacks D. crack passwords E. trigger denial of service attacks

D. crack passwords

Ch. 4 The advantage of optical fibers over twisted pairs is NOT A. higher bandwidth B. better security C. lower interference D. higher attenuation E. longer signal propagation

D. higher attenuation

Ch. 10 The following information should be kept in "127.0.0.1 localhost" (for IPv4) "::1 localhost" (for IPv6) A. local DNS servers B. root DNS servers C. DNS authority servers D. host computers E. DHCP servers

D. host computers

Ch.4 The main equipment room subsystem A. is a demarcation point between the internal network and an ISP network. B. is typically located on the top floor of a building. C. houses workgroup switches that directly connect user stations. D. is the termination point of backbone cabling. E. is the ending point of horizontal cabling.

D. is the termination point of backbone cabling

Ch. 12 The hash function is used to derive a ___________ from an original message: A. public key B. digital certificate C. Private key D. message digest

D. message digest

Ch.4 When light signals travel in different modes (angles) through the fiber-optic cable, they may not reach the destination in exact time interval, this is ________. A. multimode transmission B. propagation conversion C. modal bandwidth D. modal dispersion E. optical interference

D. modal dispersion

Ch. 4 When multimode and single-mode fibers are compared, A. multimode supports full-duplex transmissions, but single-mode does not. B. multimode is more reliable than single mode in maintaining signal integrity. C. single mode is easier to multiplex than multimode. D. multimode is adequate for LANs and campus network, but not for WANs. E. multimode has higher capacity than single mode.

D. multimode is adequate for LANs and campus network, but not for WANs

Ch. 12 An applicant is sending an encrypted message with her/his digital signature appended. To authenticate the sender, the verifier (message receiver) uses a/the ________. A. private key of the verifier B. public key of the verifier C. private key of the applicant D. public key of the applicant E. session key

D. public key of the applicant

Ch. 12 The router's ACL examines PDUs of the following protocols, EXCEPT (choose the least relevant): A. IP B. TCP C. UDP D. DNS E. ICMP

D.DNS

Ch. 12 Which is NOT a technology solution for user or message authentication? A. Digital signature B. Digital certificate C. Password/passphrase D. Voice/biometric recognition E. ACL

E. ACL

Ch.12 Choose an ACCURATE statement on asymmetric versus symmetric key encryption. A. In asymmetric key encryption, both parties encrypt and decrypt messages with the same single key. B. In symmetric key encryption, each party should have two keys—a public key and a private key. C. In asymmetric key encryption, only one key must be shared between communicating parties. D. Symmetric keys are longer than asymmetric keys. E. Asymmetric key encryption is slower than symmetric key encryption.

E. Asymmetric key encryption is slower than symmetric key encryption.

Ch. 10 The __________ plays a critical role in enabling IP packet forwarding between autonomous systems. A. DHCP (Dynamic host configuration protocol) B. ARP (Address resolution protocol) C.IGP (Interior gateway protocol) D. OSPF (Open shortest path first) E. BGP (Border Gateway Protocol)

E. BGP (Border Gateway Protocol)

Ch. 12 When a person has a 20-MB message to transmit electronically, how can she add a digital signature for sender authentication? A. By scanning her handwriting signature B. By encrypting the message with her own public key C. By encrypting the message with her own private key D. By encrypting the message digest with her own public key E. By encrypting the message digest with her own private key

E. By encrypting the message digest with her own private key

Ch. 10 Which is CORRECTLY paired between a VPN standard and its operational layer? A. IPSec: internet, SSL: data link B. IPSec: internet, SSL: application C. IPSec: transport, SSL: data link D. IPSec: transport, SSL: application E. IPSec: internet, SSL: transport

E. IPSec:Internet, SSL:Transport

Ch. 10 Which is a top-level domain name? A. .com B. whitehouse.gov C. www.stanford.edu D. sdsu.edu/mis E. microsoft.com

A. .com

Ch. 10 The transition from IPv4 to IPv6 will be rather gradual, and one approach that allows their coexistence is direct address conversion. In that approach, 123.45.67.89 (IPv4) becomes ________ for IPv6: A. 0000:0000:0000:0000:0000:ffff:123.45.67.89 B. 1111:1111:1111:1111:1111:ffff:123.45.67.89 C. 123.45.67.89: 0000:0000:0000:0000:0000:0000 D. 1111:1111:1111:1111:1111:0000:123.45.67.89 E. 123.45.67.89:1111:1111:1111:1111:1111:ffff

A. 0000:0000:0000:0000:0000:ffff:123.45.67.89

Ch. 10 Choose a CORRECT statement regarding VPN standards. A. SSL offers the most secure VPN solution among available standards. B. The IPSec's tunnel mode is more cost-effective to implement than the transport mode. C. Implementing the IPSec's tunnel mode requires software installation in each computer. D. IPSec's security software is embedded in web browsers. E. When SSL is combined with HTTP, the mutual authentication of both client and server is mandated

B. The IPSec's tunnel mode is more cost-effective to implement than the transport mode.

Ch. 4 When the number of possible voltage states doubles in digital signaling, A. one more bit can be additionally sent per clock cycle. B. two more bits can be additionally sent per clock cycle. C. the effective data rate is increased by 50%. D. the effective data rate is reduced by 50%. E. the number of bits sent per clock cycle remains the same.

A.one more bit can be additionally sent per clock cycle

Ch.10 Choose an INCORRECT statement regarding DHCP. A. It is a protocol used to obtain temporary IP addresses. B. When a user computer is powered on, it broadcasts the DHCP request. C. A router may be programmed to provide DHCP service to requesting hosts. D. When an IP is assigned to a host, the information is updated to a DNS server. E. Many web servers obtain their IP addresses from DHCP servers.

E. Many web servers obtain their IP addressed from DHCP servers

Ch.10 ________ represents an arrangement of direct links between ISPs to bypass NAPs. A. Pairing B. Channeling C. Exchanging D. Hopping E. Peering

E. Peering

Ch. 10 Which is NOT in the first 64 network address bits of IPv6? A. Regional registry prefix B. ISP prefix C. Site prefix necessary for global routing D. Subnet prefix E. TTL prefix

E. TTL prefix

Ch.10 Which describes the transport mode of IPSec? A. IPSec servers are placed at the boundary of local sites. B. Hosts internal to a site are not aware of IPSec servers. C. When a packet in transition is in a corporate network, it remains unencrypted. D. It is a popular choice for implementing intranet-based site-to-site VPNs. E. The data field of an IP packet is protected by encryption, but not the IP header.

E. The data field of an IP packet is protected by encryption, but not the IP header.

Ch.4 Choose a CORRECT statement in comparing baseband and broadband transmissions. A. Baseband allows the flow of only a single data type (e.g., texts) at a time. B. Baseband is slower than broadband. C. Wired computer networks (e.g., Ethernet) primarily rely on broadband transmissions. D. With baseband, several frequency channels can be created within a cable. E. Using broadband, analog signals can travel through a cable concurrently.

E. Using broadband, analog signals can travel through a cable concurrently

Ch. 4 Six components (or subsystems) of the structured cabling system do NOT include A. main equipment room B. backbone (vertical) cabling C. telecommunications (or wiring) closet D. horizontal cabling E. cross-connect cabling

E. cross-connect cabling

Ch. 11 Which is NOT a well-known security threat for the WiFi LAN? A. rogue AP B. evil twin C. wardriving D. DOS E. fingerprinting

E. fingerprinting

Ch. 12 Firewalls can undertake the following functions, EXCEPT: A. packet inspection and filtering B. NAT C. detection of denial-of-service attacks D. packet filtering based on application layer information such as web content and URL addresses E. provision of digital certificates

E. provision of digital certificates

Ch. 4 The straight-through cable should be used to connect two nodes, EXCEPT A. switch-router B. PC-switch C. wireless access points-router D. server-switch E. server-router

E. server-router

Ch. 4 5. Which link needs crossover cabling (assume that MDIX is not available)? A. switch-router B. user PC-switch C. server-switch D. wireless access point-router E. switch-switch

E. switch-switch

Ch. 4 Structured cabling is achieved in a building when A. voice and data communications depend on digital signaling. B. network nodes are interconnected in the "star" topology. C. the trunk links utilize optical fibers. D. the cabling is designed to integrate voice and data traffic. E. the cabling is conducted according to published standard practices.

E. the cabling is conducted according to published standard practices

25. The following figure shows the process of ________ in data transmissions? A. frequency division multiplexing B. amplitude modulation C. frequency modulation D. statistical time division multiplexing E. time division multiplexing

E. time division multiplexing

Ch.4 The transmission power of a signal weakens as it progresses. This is called ________. A. attenuation B. distortion C. interference D. withdrawal E. dispersion

A.attenuation

Ch. 11 The ________ is a password cracking method that relies on a computer's powerful processing capability. A. worm B. social engineering C. dictionary attack D. packet sniffing E. port scanning

C. Dictionary Attack

Ch.4 What is a metric of analog signal frequency? A. voltage B. Bandwidth C. Hertz D. Nanometers

C. Hertz

Ch. 11 Which correctly describes ARP poisoning? A. An attacker sends "ARP replies" to a target computer to tell that the MAC address of its default gateway is the attacker's own MAC address. B. An attacker sends "ARP requests" to a target computer to tell that the MAC address of its default gateway is the attacker's own MAC address. C. An attacker sends "ARP requests" to the default gateway to tell that the IP address of its victim computer is the attacker's own IP address. D. An attacker sends "ARP requests" to the default gateway to tell that the MAC address of its victim computer is the attacker's own MAC address. E. An attacker sends "ARP replies" to a target computer to tell that the IP address of its default gateway is the attacker's own IP address.

A. An attacker sends "ARP replies" to a target computer to tell that the MAC address of its default gateway is the attacker's own MAC address.

Ch. 12 The "____________" is a process that validates "you are the person/system you claim to be". A. Authentication B. Authorization C. Association D. Address Filtering

A. Authentication

Ch. 10 The statement, "127.0.0.1 localhost", should be included in the ___________ file of a computer" A. DNS B. DHCP C. ARP D. HTTP

A. DNS

Ch. 12 Which of the following is considered a stateful firewall filtering rule? A. If source and destination sockets are in the connection table, then PASS the packet. B. If protocol = TCP and destination port number = 25, then PASS the packet. C. If IP address = 10.47.122.79, protocol = TCP, and destination port number = 80, then PASS the packet. D. If protocol = UDP, then DROP the packet. E. If protocol = ICMP, then DROP the packet.

A. If source and destination sockets are in the connection table, then PASS the packet.

Ch.11 When an attacker sets up a DHCP server to steal user information (e.g., password), it is a type of ________ security threat. A. MITM B. rogue AP C. evil twin D. wardriving E. DOS

A. MITM

Ch. 11 The evil twin AP is a form of ________. A. MITM attack B. wardriving attack C. zombie AP attack D. DOS attack E. port scanning attack

A. MITM Attack

Ch. 12 Which information may NOT be included in a digital certificate? A. Owner's private key B. Issuer company C. Expiration date D. Name of its owner E. Owner's public key

A. Owner's private key

Ch. 11 When the default NIC setting is converted into the promiscuous-mode, it allows more extensive: A. Packet sniffing B. Spamming C. Port Scanning D. Fingerprinting

A. Packet sniffing

Ch. 11 Phishing is a form of ________ attack. A. social engineering B. port scanning C. packet sniffing D. fingerprinting E. MITM

A. Social engineering

Ch.10 When "hypervisor-based virtualization" and "hosted virtualization" are compared: A. The host machine needs its own host operating system ONLY when "hosted virtualization" is used. B. The VM needs to have its own operating system ONLY when "hosted virtualization" is used. C. The VM running on "hosted virtualization" has better performance than that on "hypervisor-based virtualization." D. The maintenance cost of "hosted virtualization" is lower than that of "hypervisor-based virtualization." E. Moving VMs from one physical computer to another is easier on "hosted virtualization" than on "hypervisorbased virtualization."

A. The host machine needs its own host operating system ONLY when "hosted virtualization" is used.

Ch. 10 Choose a WRONG statement regarding Domain Name System (DNS). A. The top-level domain includes university names. B. The second-level domain is also called sub-domain. C. Obtaining a second-level domain name, an organization can freely create lower-level domain names. D. The country code is a top-level domain. E. The URL combines a protocol and a domain name.

A. The top-level domain includes university names.

Ch. 10 Benefits of VPN do NOT include: A. VPN performance is not affected by Internet congestion. B. VPN offers flexibility in forming and terminating secure connections over the Internet. C. VPN affords bandwidth scalability in which the data rate between a client and an ISP can grow. D. VPN supports anytime, anywhere, and any-to-any accessibility. E. VPN is cost-effective in forming WAN links.

A. VPN performance is not affected by Internet congestion

Ch. 12 ________ is a security standard developed for 802.11 WiFi LANs. A. Wired equivalent privacy (WEP) B. Secure socket layer (SSL) C. Packet acknowledgments D. Service set identifier (SSID) E. Pretty good privacy (PGP)

A. WEP

Ch.11 A hacker sends an email with an attachment that, if activated by an unsuspecting user, searches up to 50 other email addresses stored in the victim's system and relays the same infection code to the email addresses. This must be a ________. A. worm B. Trojan horse C. zombie D. virus E. spam

A. Worm

Ch. 12 The digital signature attached to a message can authenticate: A. both the message sender and message itself B. the message sender only C. the message only D. both the message sender and receiver E. both the message receiver and message itself

A. both the message sender and message itself

Ch.11 Every possible combination of alphanumeric characters can be applied to crack the password of a system. This is a form of ________. A. brute force attack B. backdooring C. dictionary attack D. packet sniffing E. hash attack

A. brute force attack

Ch. 11 The email in the figure is an example of ________: A. phishing B. sniffing C. MITM attack D. cracking E. scanning

A. phishing

Ch. 4 The number of twists per foot, copper purity, electrical resistance, and insulation type are properties that determine A. the category of a twisted pair B. the mode of an optical fiber (single mode vs. multimode) C. the type of a patch cable D. the category of an optical fiber E. the type of a twisted pair (crossover vs. straight-through)

A. the category of a twisted pair

Ch. 4 The access (or workgroup) switch is generally placed in the ________. A. wiring closet subsystem B. work area subsystem C. horizontal cabling subsystem D. backbone cabling subsystem E. equipment room subsystem

A. wiring closet subsytem

Ch. 4 DS0 represents the unit speed of a voice-grade channel. Then, its speed must be A. 64kbps B. 128kbps C. 32kbps D. 45kbps E. 10kbps

A.64 kbps

Ch. 10 Which is an INCORRECT statement on server virtualization? A. The VM installed in a host computer has its own operating system. B. The number of servers an IT professional can manage declines with server virtualization. C. The number of physical servers necessary to deliver equivalent amount of computing is reduced. D. The need for physical cabling of server computers to the network decreases. E. IT service disruption due to maintenance and outages is reduced.

B. The number of servers an IT professional can manage declines with server virtualization.

Ch 11. A video player infected with malware was downloaded. When it was installed, the ________ was activated and changed my computer's default DNS setup to direct all DNS inquires to the rogue DNS server maintained by a criminal group. A. worm B. Trojan C. macro D. rootkit E. backdoor

B. Trojan

Ch. 12 The PKI is maintained and operated by ________. A. governments B. certificate authorities C. Internet engineering task force D. Internet service providers (ISPs) E. WAN service providers

B. certificate authorities

Ch. 12 The PKI and X.509 are necessary elements of the ________ technology. A. digital signature B. digital certificate C. public key encryption D. symmetric key encryption E. message digest

B. digital certificate

Ch. 12 When a digital signature is used for authentication, a session key can be utilized concurrently to: A. generate a message digest by the sender. B. encrypt the original message and digital signature. C. generate a digital signature by the sender. D. generate a digital signature by the receiver. E. generate a message digest by the receiver.

B. encrypt the original message and digital signature

Ch. 10 Local or regional ISPs, typically access the Internet through the: A. virtual private network B. internet exchange point C. peer ISP D. internet gateway

B. internet exchange point

Ch. 11 Wireshark is probably the most popular tool for ________? A. port scanning B. packet sniffing C. MITM attack D. social engineering E. spam generating

B. packet sniffing

Ch. 12 The main components of cryptography system include the following except: A. ciphertext B. password C. encryption algorithm D. plaintext

B. password

Ch. 4 The ________ is used to make a physical connection between two closely placed network nodes. A. parallel cord B. patch cord C. conversion cord D. horizontal cord E. vertical cord

B. patch cord

Ch. 11 Which may be the LEAST relevant approach to steal someone's password? A. social engineering B. port scanning C. phishing D. brute force attack E. keystroke logging

B. port scamming

Ch. 11 Which represents a security hazard a corporate employee can create unintentionally? A. evil twin AP B. rogue AP C. master AP D. wardriving AP E. drive-by hacker AP

B. rogue AP

Ch. 4 The T-1 line combines multiple signals using ________ for their concurrent deliveries. A. frequency division multiplexing B. time division multiplexing C. wavelength division multiplexing D. dense wave division multiplexing E. code division multiple access

B. time division multiplexing

Ch. 12 The digital certificate: A. is an alternative authentication method when encryption is unavailable. B. validates the owner of a particular public key. C. transports a private key to the owner. D. is a method to securely exchange session keys. E. is an electronic receipt of an online transaction.

B. validates the owner of a particular public key.

Ch. 4 Patch panels are used widely in the ________ to intermediate connections between end stations and switches. A. building entrance B. wiring closet C. backbone cabling area D. work area E. switch room area

B. wiring closet

Ch. 4 If the lowest and highest frequencies allowed by a transmission channel are 30 MHz and 50 Mhz respectively, its bandwidth is: A. 1500 MHz B. 80 MHz C. 20 MHz D. 30 MHz

C. 20 MHz

Ch. 10 If the following IPv6 address is reduced to the smallest: (AD89:00C0:0204:0000:0000:ABC0:000B:0000) A. AD89:C0:204:0:ABC0:000B:: B. AD89:C0:204:0:0:ABC0:B:0 C. AD89:C0:204::ABC0:B:0 D. AD89:C0:204:0:0000:ABC0:00B:0

C. AD89:C0:204::ABC0:B:0

Ch.11 Which attack or pre-attack CAN be done without planting malware or gaining access to a victim's computer or network? A. worm B. Trojan C. DOS D. port scanning E. MAC address flooding

C. DOS


Set pelajaran terkait

Hazard Analysis and Critical Control Points

View Set

AP Gov: Chapter 1, 2 & 3 Questions

View Set

Computers & Information Technology

View Set

Chapter 3, Health, Illness, and Disparities

View Set