BISM 2600

Ace your homework & exams now with Quizwiz!

Transmission speed is normally measured in ________.

Bits per second

Network speeds usually are measured in ________.

Bits per seconds

Jitter is a problem for ________

Both A & B (VoIP / Streaming Media)

When a firewall identifies an attack packet, it ________.

Both A&B

Standards govern ________.

Both A&B (Semantics / Syntax)

Cloud customers are concerned that ________.

Both A&B (Their data might be hacked / Government has access to their data secretly)

Attack programs that can be remotely controlled by an attacker are ________

Bots

Which of the following can be upgraded after it is installed on a victim computer? (Choose the most specific answer.)

Bots

A password-cracking attack that tries all combinations of keyboard characters is called a ________

Brute-Force attack

"Octet" is the same as ________

Byte

At what layer are frames standardized?

Data Link

At what layer do you find EUI-48 addresses?

Data Link

An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.)

Defense of Depth

To make a forwarding decision, a router looks at the arriving packet's ________.

Destination IP address

Switches make decisions based on the ________

Destination data link layer address

The address 60.49.7.254 is represented in ________

Dotted Decimal Notation

Small malware programs that download larger malware programs are called ________.

Downloaders

The Target attackers probably first broke into Target using the credentials of a(n) ________.

Employee in a firm outside Target

________ is placing a message in the data field of another message

Encapsulation

Converting application messages into bits is called ________.

Encoding

The messages of VPNs ________.

Encrypted

Firewall log files should be read ________.

Everyday

Methods that hackers use to break into computers are ________.

Exploits

If a firewall does not have the processing power to filter all of the packets that arrive, ________.

It will drop packets it cannot process

Variability in delay is called ________

Jitter

A program that can capture passwords as you enter them is ________

Keystroke Logger

When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________.

Latency

Egress filtering examines packets ________.

Leaving to the outside

Stateful firewalls are attractive because of their ________.

Low cost

SDN holds the promise of bringing ________.

Lower Cost

An EUI-48 address was formerly called a(n) ________ address

MAC

The general name for evil software is ________.

Malware

An SLA for latency should specify a ________

Maximum

QoS is quantified through ________.

Metrics

Latency is usually measured in ________

Milliseconds

An SLA for availability should specify a ________

Minimum

An SLA for speed should specify a ________

Minimum

Priority addresses the problem of ________.

Momentary Traffic Peaks

When messages of different users share a transmission line, this is ________

Multiplexing

Which type of firewall filtering looks at application-layer content?

NGFW

Jitter is a problem for ________

Neither (Downloading a file attached to an email / E-mail)

Which type of firewall filtering collects streams of packets to analyze them as a group?

Next-Generation

Who controls the Internet?

No one

What type of address is 100 bits long?

None

If you know the name of another computer on your network and want to find the IP address, what is a DOS command you can use to find the IP address?

Nslookup

Guarantees by a provider to meet certain delivery quality specifications are called ________.

Service Level Agreements (SLA)

Tricking users into doing something against their security interests is ________

Social Engineering

Unsolicited commercial e-mail is better known as ________.

Spam

An attack aimed at a single person or a small group of individuals is a(n) ________ attack. (Choose the most specific answer.)

Spear Fishing

Throughput is ________.

Speed a network actually provides to users

The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.

Spyware

Malware programs that masquerade as system files are called ________.

Trojan

What layer number is the physical layer?

1

What layer number is the data link layer?

2

20,000 bits per second is ________

20 Kbps

Overprovisioning means ________.

Adding much more switching and transmission line capacity than will be needed most of the time

Which of the following is a host when it is on a network?

All of the above

The electrical signal generated by a microphone is called a(n) ________ signal

Analog

At what layer is encoding done?

Application

At which layer would you find standards for requesting videos from a video-sharing site such as YouTube?

Application

On a server, well-known port numbers indicate ________

Applications

Actions that people are allowed to take on a resource come under the heading of ________

Authorizations

________ is the percentage of time that a network is available for use.

Availability

UDP is ________.

Unreliable

Depicting the Internet as a cloud symbolizes that ________.

Users do not have to know how the Internet operates and where resources are located

Which of the following is latency intolerant?

Video

Which can be moved more easily?

Virtual Machine

Which of the following attach themselves to other programs?

Viruses

The general name for a security flaw in a program is a ________.

Vulnerability

Attacking your own firm occurs in ________.

Vulnerability Testing

SSL/TLS is used for ________.

Web Applications

A policy specifies ________

What should be done

Which of the following sometimes uses direct propagation between computers?

Worms

________ are full programs.

Worms

An SLA should specify the ________

Worst

Vulnerability-based attacks that occur before a patch is available are called ________ attacks.

Zero-Day

IaaSs own _________.

Servers

In QoS, the S stands for ________.

Service

If someone says that a 1-bit flag is set, this means that it is given the value ________.

1

In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. You and three others are transmitting or receiving at a particular moment. What speed should you expect to get?

1.25

Convert decimal 8 to binary

1000

Convert a decimal number 15 to the binary number.

1111

What layer number is the Internet layer?

3

320,000 kbps is ________

320 Mbps

Convert the binary number 100 to decimal

4

What layer number is the transport layer?

4

How long are IPv4 addresses in octets?

4 Octets

EUI-48 addresses are ________.

48 bits long

In the Five General Layers Standard, which layer's standards govern application World Wide Web exchanges over the Internet?

5

In distributed DoS attacks, the attacker sends messages directly to ________

A command and control server

The Target attackers sold their stolen card information to ________

Card Shops

What type of attacker are most of attackers today?

Career Criminals

A specific encryption method is called a ________

Cipher

ACLs are used for packets in the ________ state

Connection-Opening

Which of the following is a form of biometrics?

Facial Recognition

Dividing an application message into a series of smaller message segments is called ________.

Fragmentation

If a transmission link has a relatively high error rate, ________.

Fragmentation is like to REDUCE delivery time

Data link layer standards govern ________.

Frame Organization

What kind of address do hosts have on the Internet?

IP Addresses

What type of address is 32 bits long?

IPv4

60.49.7.254 is an ________

IPv4 Address

________ collectively form the core of the Internet service

ISPs

Who are the most dangerous types of employees?

IT Security Employees

Compared to other methods for reducing problems during momentary traffic peaks, overprovisioning ________.

Increase capital cost

Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.

Individual Throughput

Users typically can eliminate a vulnerability in one of their programs by ________

Installing a patch

Standards tend to bring _________.

Interoperability

What is a DOS command you can use to find the IP address of your PC?

Ipconfig

Error rates can soar when the network traffic level ________.

Is at a High Level

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually ________.

Passes the packet *Ongoing connection

Pieces of code that are executed after the virus or worm has spread are called ________

Payloads

Another term for authorization is ________

Permission

An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________. (Select the most specific answer.)

Phishing

A ________ may have multiple ________

Physical Server, Virtual Machines

To determine if a host is reachable, you would send a(n) ________.

Ping

Standards mean the same thing as ________.

Protocols

Internet standards are published as ________.

RFC's

DoS attacks attempt to ________.

Reduce the availability of a computer

Balancing threats against protection costs is called ________.

Risk Analysis

What device connects different networks into an Internet?

Router

Which type of service manages application software for users?

SaaS

The meaning of a message is referred to as the message's ________

Semantics

In authentication, the ________ is the party trying to prove his or her identity.

Supplicant

How a message is organized is its ________.

Syntax

Which of the following probably suffered the most financial damage from the Target breach?

Target


Related study sets

Chapter 19- Urinary System -Fluid and Electrolyte Balance

View Set

Growth & Develop Linton Ch. 10 Developmental Processes

View Set

US History Test #1 Study Questions

View Set

Review for Pobre Ana bailó tango Test

View Set

Lesson 2.4 I need to work on my image + review unit 1-2

View Set