CIS 344 Exam 2

Ace your homework & exams now with Quizwiz!

amplitude

A measure of a signal's strength at any given point in time

Statistical multiplexing

Which kind of multiplexing assigns slots to nodes according to priority and need?

They both provide AAA (authentication, authorization, and accounting) not access control

Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+

FDM (frequency division multiplexing)

assigns a unique frequency band to each communications subchannel.

digital signals

composed of pulses of precise, positive voltages and zero voltages

Buffer overflow

what kind of vulnerability is exploited by a ping of deaths?

phase

The progress of a wave over time in relationship to a fixed point.

TGT (Ticket-Granting Ticket)

What kind of ticket is held by Kerberos' TGS?

Default password was never made.

A neighbor hacks into your secured wireless network on a regular basis, but you did int give him the password. What loophole was most likely left open?

the private key

In public key encryption, which key is used to decrypt the message?

(wavelength = speed of light / frequency)

Know how to compute RF Wavelength from Frequency

Private cloud

Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a _________.

to assign rights that meet the needs of those groups.

Regarding managing security security levels, why do network administrators create domain groups?

throughputbecause Signal to noise ratio (SNR or S/N).

Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower___________ because of the high proportion of noise.

wavelength

The distance between corresponding points on a wave's cycle (for exam- ple, between one peak and the next) expressed in meters or feet

frequency

The number of times that a wave's amplitude cycles from its starting point, through its highest amplitude and its lowest amplitude, and back to its starting point over a fixed period of time

Frequency

To exchange information, two antennas must be tuned to the same_________.

Amplitude - A measure of a signal's strengthfrequency - the number of times a wave's amplitude cycleswavelength - the distance between corresponding points on the wave's cyclephase - the progress of a wave over time

What are the four fundamental properties of an analog signal?

IPsec and SSL

What are the two primary encryption techniques used by VPN's today?

Content filtering and improved performance, reverse proxy.

What are the two primary features that give proxy servers an advantage over NAT?

Not being configured correctly

What causes most firewall failures?

ARP performs no authentication, and so it is highly vulnerable to attacks.

What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?

Cost and Optical loss

What characteristic of optical transmissions is primarily responsible for the distance limitations of fiber-optic cabling?

amplifier and repeater

What device can boost an analog signal? A digital signal?

to be a virus it must replicate itself with the intent to infect more computers.

What distinguishes a virus from other types of malware?

It is part of the Terminate fiber-optic cable process

What does a fiber cleaver do?

The modem connects to your ISP, which typically provides either cable or DSL Internet service

What does a modem do?

port forwarding

What feature must be configured on a router to redirect traffic from an insecure port to a secure one?

Heat map

What feature of a site survey maps the Wi-Fi signals and other noise in your location?

AD (Active Directory)

What feature of windows server allows for agent-less authentication?

Kevlar (polymeric fiber)

What fiber is used in fiber-optic cabling to protect the inner core and prevent the cable from stretching?

A short circuit is an unwanted connection, such as when exposed wires touch each other. An open circuit is one where needed connections are missing, such as when a wire breaks.

What is the difference between short circuits and open circuits?

remote access server (RAS)

What service in Windows Server 2012 R2 Authenticates remote users and computers to the windows domain and its corporate network resources?

agent

What software might be installed on a device in order to authenticate it to the network?

enables always -on remote connections while also allowing VPN connections to the network

What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess?

because the vulnerability is exploited before the software developer has the opportunity to provide a solution for it

What unique characteristic of zero-day exploits make them so dangerous?

Jamming

What wireless attack might a potential hacker execute with a specially configured transmitter?

IDS (intrusion detection system) creates alerts when suspicious activity happens.IPS (intrusion Prevention system) prevents traffic from reaching the network.

What's the difference between an IDS and an IPS?

The signal may pass through the object or be absorbed by the object, or it may be subject to the following phenomena: reflection, diffraction, or scattering.

When a wireless signal encounters a large obstacle, what happens to the signal?

Simplex, simplex and half-duplex

When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the cable uses___________ transmissions, the receive pair in the cable uses ___________ transmissions, and the twisted-pair in the cable uses ___________transmissions.

Certificate authority (CA)

When surfing online, you get some strange data on and apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?

802.11n

Which 802.11 standard can be used in both the 2.4-GHz and 5-GHz bands?

class 1

Which Bluetooth class has the highest power output?

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

Which Carrier Sense technology is used on wireless networks to reduce collisions?

PPTP uses TCP at the Transport layerL2TP uses UDP

Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP use?

Cat5e or higher

Which categories of twisted-pair cable can support Gigabit Ethernet?

PaaS (Platform as a Service)

Which cloud computing service model gives software developers access to multiple operating systems for testing?

GRE (generic Routing Encapsulation) uses IPsec for security when transmitting.

Which encryption protocol does GRE use to increase the security of its transmissions?

5-GHz band

Which frequency band offers 24 unlicensed communications channels in the United States?

Unidirectional antenna

Which kind of antenna is used in a point to point link?

ethernet

Which of the following is not an example of a broadband transmission?

WI-FI

Which one of the following wireless transmission types does NOT require a clear LOS to function

probe

Which part of a toner and probe kit emits a tone when it detects electrical activity on wire pair?

PPoE (PPP over Ethernet)

Which remote access protocol is used over an Ethernet network?

Unlike PPTP, L2TP is a standard accepted and used by multiple vendors.

Which tunneling protocol is accepted and used by multiple vendors?

SSL and TSL

Which two protocols are available to secure transmissions for HTTP sessions?

DDroS ( Distributed reflective DoS)

Which type DoS attack orchestrates an attack using uninfected computers?

Near end cross-talk (NEXT)

Which type of cross-talk occurs between wire pairs near the source of a signal?

Analog

Which type of transmission is measured by baud rate?

the end faces are placed at an angle to each other.

Why do APC ferrules create less back reflection than do UPC ferrules?

Wireless networks experience a high number of collisions and require greater overhead on each transmission.

Why do wireless networks experience such a great reduction in actual throughput compared with their respected with their respective theoretical throughput?

Signals traveling over multi mode fiber experience greater attenuation than those traversing single mode.

Why is SMF more efficient over long distances than MMF?

A guest network

You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you set up on her AP to meet her requests?

Rogue access point

You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?

Evil twin

Your just settled in for some study time at the local coffee shop, and you pause long enough to connect your computer to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize you clicked on an SSID called "Free Coffee and Internet." what kind of security trap did you almost fall for?

Posture assessment

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?

encryption and hashing

_________ is used for confidentiality while ________ is used for integrity and authentication.

Blue-snarfing

A hacker takes advantage of a Bluetooth connection to send a virus to a user's phone. What kind of security breach has occurred?

20-, 40-, 80-, and (optional) 160-MHz channels

802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size channels does 802.11ac support?

multiplexing

A form of transmission that allows multiple signals to travel simultaneously over one medium

Brute force attack

A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?

ad hoc WLAN

A student has completed his part of a group research paper, and needs to share it with a classmate. He sees the classmate as they're crossing the parking lot between classes. Which WLAN architecture could they use to transfer the file from one laptop to the other?

NFC (near-field communication)

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?

RTP

All types of remote access techniques require some type of _________, which accepts a remote connection and grants privileges to the network's resources.

Onboarding (because the remote wipe capability was added to the phone when it first went through the onboarding process)

An employee has lost his company-provided phone during a business trip. What process ensures that he can now perform a remote wipe?

dropped, implicit deny

Any traffic that is not explicitly permitted in the ACL is _______, which is called the ______.

Layer 7, Application Layer

At what layer of the OSI model do proxy servers operate?

BNC and F-connector for TVs

Common Coaxial Cable connectors

bandwidth > throughput

Difference between throughput and bandwidth

wireless

EAPoL is primarily used with what kind of transmission?

baud rate (Bd)

For analog transmissions, throughput and bandwidth can also be measured by the number of symbols transmitted per second, and this measurement is called

The delay from when the data leave the source and when it arrives, the unit is called RTT (round trip time)

How is latency measured and in what unit?

cat 6a

What is the earliest-pair cabling standard that meets the minimum requirements for 10Gbase-T transmissions?

Layer 3

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

128-bit key size

What is the minimum acceptable key size for today's security standards?

The number of twist per meter is know as twist ratio. The more twist per meter, the more it is resistant to cross talk.

What is twist ratio and why is it important?

Coaxial cable, coaxial cable, and F- connector

What kind of cable uses BNC connectors? F-connectors? Which connector is likely to be used by cable TV?

content-filtering firewall

What kind of firewall blocks traffic based on application data contained within the packets?

boot-sector viruses

What kind of virus runs in place of the computer's normal systems files?

Wrong people being able to log in

What kinds of issues might indicate a miss-configured ACL?

NGFW have built-in Application Control features and are application aware, user awareness, context aware.NGFW does not use UTM

What of the following features does not distinguish an NGFW from traditional firewalls?

UTP

consists of one or more insulated wire pairs encased in a plastic sheath

STP

consists of twisted-pair wires that are not only individually insulated, but also surrounded by a shielding made of a metal- lic substance such as foil.

TDM (time division multiplexing)

divides a channel into multiple intervals of time, or time slots.

statistical multiplexing

rather than assigning a separate slot to each node in succession, the transmitter assigns slots to nodes according to priority and need

broadband

technologies in which multiple transmissions share a single media.

AM (amplitude modulation)

the amplitude of the carrier signal is modified by the application of the data signal.

FM (frequency modulation)

the frequency of the carrier signal is modified by the application of the data signal.

baseband

transmissions that are carried on a single channel, with no other transmission sharing the media

analog signals

vary infi- nitely and continuously and appear as a wavy line when graphed over time


Related study sets

CH 17 Uterus and Vagina Review Questions

View Set

Chapter 21: Nursing Care of the Child With an Alteration in Urinary Elimination/Genitourinary Disorder

View Set

Chapter 02: Clinical Safety: The Core of Leading, Managing, and Following

View Set

AICE INTERNATIONAL HISTORY... THE FIRST WORLD WAR 1914-1918 (1)

View Set