Chapter 10 (Test 3)

Ace your homework & exams now with Quizwiz!

A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator is the definition of application proxy firewall. True or False?

False

A stateful inspection firewall compares received traffic with a set of rules that define which traffic it will permit to pass through the firewall. True or False?

False

Another name for a border firewall is a DMZ firewall. True or False?

False

IPv6 addresses are 64-bit numbers. True or False?

False

Internet Control Message Protocol (ICMP) is a method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address. True or False?

False

The term screened subnet refers to a firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator. True or False?

False

A network protocol governs how networking equipment interacts to deliver data across the network. True or False?

True

Border firewalls simply separate the protected network from the Internet. True or False?

True

Dynamic Host Configuration Protocol (DHCP) means a protocol used on IP networks to provide configuration details automatically to client computers. True or False?

True

NAC works or wired and wireless networks. True or False?

True

Telephony denial of service (TDoS) is a variation of a denial of service (DoS) attack, but is launched against traditional and packet-based telephone systems. A TDoS attack disrupts an organization's use of its telephone system through a variety of methods. True or False?

True

The OSI Reference Model is a theoretical model of networking with interchangeable layers. True or False?

True

The physical layer must translate the binary ones and zeroes of computer language into the language of the transport medium. True or False?

True

The term hactivist describes a hacker who is, or claimsto be, motivated by political or social justice concerns and uses hacking skills to reinforce his or her chosen position. True or False?

True

The traceroute commands displays the path that a particular packet follows so you can identify the source of potential network problems. True or False?

True

Which of the following is the definition of network address translation (NAT)? a. A method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address b. A method to restrict access to a network based on identity or other rules c. A protocol to implement a VPN connection between two computers d. A management protocol for IP networks

a. A method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address

What term is used to describe the current encryption standard for wireless networks? a. Wi-Fi Access (WPA) b. Wired Equivalent Privacy (WEP) c. Wireless Access Point (WAP) d. Screened subnet

a. Wi-Fi Access (WPA)

A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator is the definition of _____________. a. packet-filtering firewall b. stateful inspection firewall c. point-to-point tunneling protocol (PPTP) d. application proxy firewall

a. packet-filtering firewall

Network _________ is gathering information about a network for use in a future attack. a. reconnaissance b. eavesdropping c. denial of service d. surveying

a. reconnaissance

________ is a suite of protocols designed to connect sites securely using IP networks. a. Network Access Control (NAC) b. Internet Protocol Security (IPSec) c. Dynamic Host Configuration Protocol (DHCP) d. Point-to-Point Tunneling Protocol (PPTP)

b. Internet Protocol Security (IPSec)

What name is given to a protocol to implement a VPN connection between two computers? a. Internet Control Message Protocol (ICMP) b. Dynamic Host Configuration Protocol (DHCP) c. Point-to-Point Tunneling Protocol (PPTP) d. Screened subnet

c. Point-to-Point Tunneling Protocol (PPTP)

A __________ contains rules that define the types of traffic that can come and go through a network. a. network protocol b. switch c. firewall d. hub

c. firewall

A method to restrict access to a network based on identity or other rules is the definition of _______________. a. media access control (MAC) b. screened subnet c. network access control (NAC) d. stateful inspection firewall

c. network access control (NAC)

Which OSI Reference Model layer must translate the binary ones and zeroes of computer language into the language of the transport medium? a. data link layer b. transport layer c. physical layer d. session layer

c. physical layer

What term is used to describe a method of IP address assignment that uses alternate, public IP address to hide a system's real IP address? a. Network Access Control (NAC) b. Application proxy firewall c. Internet Control Message Protocol (ICMP) d. Network Address Translation (NAT)

d. Network Address Translation (NAT)

Which OSI Reference Model layer includes all programs on a computer that interact with the network? a. network layer b. session layer c. presentation layer d. application layer

d. application layer

Which OSI Reference Model layer is responsible for transmitting information on computers connected to the same local area network (LAN)? a. session layer b. transport layer c. presentation layer d. data link layer

d. data link layer

A _________ controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network. a. router b. switch c. hub d. firewall

d. firewall


Related study sets

NS2-Episode 1 Behavior Influence

View Set

Health insurance Test Day Review 2

View Set

MATH 1242 Final Exam Study Guide Part 3

View Set

Comparative Management Chapters 8-11

View Set

BIO 140 - Chapter 7 Microbial Growth

View Set

The Sentence Completion Question Tactics

View Set