MIS 3317 Midterm

Ace your homework & exams now with Quizwiz!

________ attacks typically extend over a period of months. A) DDoS B) Malware C) APT D) Spear phishing

APTs

A host sends a packet to another host with six single networks along the way. How many frames are involved? A) 1 B) 6 C) 7 D) 8

6

The 802.11ac Wi-Fi standard uses 256 states. How many bits can it send per clock cycle? A) 8 B) 16 C) 32 D) none of the above

8

To transmit three bits per clock cycle, you must have ________ states.

8

Which light wavelength dominates in LANs?

850 nm

Which of the following is used most often in LANs for fiber transmission links? A) 850 nm multimode fiber B) 850 nm single-mode fiber C) 850 nm multimode-mode fiber D) 1,550 nm single-mode fiber

850 nm multimode fiber

SPI firewalls are being replaced in large part because they are limited in their ability to detect ________.

port spoofing

Iris scanning is attractive because of its ________.

precision

What problem limits transmission distance in 4-pair UTP? A) reflection at the two ends B) heat conduction C) radiation D) none of the above

radiation

Using standard configurations ________. A) saves money B) gives management agility C) both A and B D) neither A nor B

saves money

Momentary traffic peaks usually last a few ________ or less. A) milliseconds B) seconds C) minutes D) hours

seconds

In ________ thinking, the opponent is primarily an intelligent attacker.

security

TCP messages are called ________. A) frames B) packets C) segments D) fragments

segments

The PAD field is added by the ________ if the frame is too short without it. A) sender B) receiver C) both A and B D) neither A nor B

sender

An SLA specifies the ________. A) best case B) worst case C) both A and B D) neither A nor B

worst case

Transmission speed is normally measured in ________. A) bits per second B) bytes per second C) octets per second D) none of the above

bits per second

In a DDoS attack, a ________ sends messages directly to the victim. A) botmaster B) bot C) command and control server D) all of the above

bot

An IP packet may include a(n) ________. A) application message or fragment B) TCP segment or UDP datagram C) both A and B D) neither A nor B

both A and B

At what layer will you find standards for access points? A) physical B) data link C) both A and B D) neither A nor B

both A and B

Employees often attack ________. a) for revenge b) for money c) both A and B d) neither A nor B

both A and B

Ethernet standards are specified at the ________ layer. a) physical b) data link c) both A and B d) neither A nor B

both A and B

For reusable passwords, NIST now recommends _________. a) that passwords be easy to remember b) that passwords be long phrases instead of being about 8-12 characters long c) both A and B d) neither A nor B

both A and B

From which standards architectures do organizations typically take their standards? A) OSI B) TCP/IP C) both A and B D) neither A nor B

both A and B

Hosts on the Internet have ________ addresses. A) IP B) data link C) both A and B D) neither A nor B

both A and B

ISPs ________. A) carry traffic in the Internet B) connect users to the Internet C) both A and B D) neither A nor B

both A and B

In a four-step close, which side transmits a FIN segment? A) the side that initiates the close B) the side that does not initiate the close C) both A and B D) neither A nor B

both A and B

In terms of security thinking, "insiders" include ________. a) employees b) many contractors working for the company c) both A and B d) neither A nor B

both A and B

Jitter is a problem for ________. a) voice over IP (VoIP) b) streaming media c) both A and B d) neither A nor B

both A and B

Momentary traffic peaks can lead to ________. a) latency b) packet loss c) both A and B d) neither A nor B

both A and B

Ping tells you ________. a) that a host is reachable b) latency in the connection to the host c) both A and B d) neither A nor B

both A and B

RSTP ________. a) can increase reliability b) was created to break accidental loops c) both A and B d) neither A nor B

both A and B

SDN can ________. a) permit routing rules to be changed rapidly b) reduce router costs c) both A and B d) neither A nor B

both A and B

The KrebsOnSecurity.com attack ________. A) was a denial of service attack. B) used IoT devices to attack the site C) both A and B D) neither A nor B

both A and B

The damage of momentary traffic peaks can be addressed by ________. a) using priority b) adding more capacity c) both A and B d) neither A nor B

both A and B

The messages of VPNs ________. a) share the same transmission lines used by other VPNs b) are encrypted c) both A and B d) neither A nor B

both A and B

The transport layer on the destination host ________. A) reassembles the application message if it has been fragmented B) removes the transport header C) both A and B D) neither A nor B

both A and B

Traffic shaping may ________ traffic that is undesirable. a) prohibit b) limit c) both A and B d) neither A nor B

both A and B

UDP ________. A) is unreliable B) has a checksum field C) both A and B D) neither A nor B

both A and B

Using the SNMP Set command ________. a) saves management labor b) requires excellent security c) both A and B d) neither A nor B

both A and B

Viruses and worms propagate through ________. a) social engineering b) exploiting vulnerabilities c) both A and B d) neither A nor B

both A and B

When a firewall identifies an attack packet, it ________. a) discards the packet b) copies information about the packet into a log file c) both A and B d) neither A nor B

both A and B

When a packet is transmitted, there is a single data link in each ________. A) point-to-point single network B) switched network C) both A and B D) neither A nor B

both A and B

Which UTP quality levels can send signals at 10 gigabits per second? a) category 6 b) category 6A c) both A and B d) neither A nor B

both A and B

Which form of authentication depends on the supplicant proving that she knows something only the true party should know? a) reusable password authentication b) iris scanning c) both A and B d) neither A nor B

both A and B

Which layer(s) governs transmission through a single network? A) data link B) physical C) both A and B D) neither A nor B

both A and B

Which of the following meets the definition of hacking? a) to intentionally use a computer resource without authorization b) to intentionally use a computer on which you have an account but use it for unauthorized purposes c) both A and B d) neither A nor B

both A and B

Which of the following uses EUI-48 addresses? A) Ethernet B) Wi-Fi C) both A and B D) neither A nor B

both A and B

The Target attackers sold stolen card information to ________. A) crimeware shops B) card shops C) card counterfeiters D) all of the above

card shops

In digital certificate authentication, the verifier gets the key it needs directly from the ________. A) supplicant B) verifier C) true party D) certificate authority

certificate authority

SNMP Set commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B

change router operation

A specific encryption method is called a ________. A) code B) schema C) key method D) cipher

cipher

On the Internet, a ________ host usually gets a dynamic IP address. A) client B) server C) both A and B D) neither A nor B

client

The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server

client

When you use your tablet to access the internet, the tablet is a ________. A) client host B) server host C) both A and B D) neither A nor B

client host

Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________. A) authentication B) confidentiality C) both A and B D) neither A nor B

confidentiality

In SPI firewalls, ACLs are used for packets in the ________ state. A) connection-opening B) ongoing communication C) both A and B D) neither A nor B

connection-opening

Creating routing tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control

control

Creating switching tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control

control

For every conversation, a client randomly generates an ephemeral port number for ________. A) applications B) conversations C) the server D) none of the above

conversations

In optical fiber, light travels through the ________.

core

The IETF primarily ________. A) manages the Internet B) creates Internet standards C) coordinates the work of ISPs D) all of the above

creates Internet standards

Optical fiber cords typically have two fiber strands. This is done to allow ________. A) redundancy B) total redundancy C) half-duplex operation D) full-duplex operation

full-duplex operation

Which is more harmful to the victim?

identity theft

The SNMP manager stores the information it receives from Get commands ________. A) in the MIB B) on the agent C) on the managed device D) in the cloud

in the MIB (Management Information Base)

SDN holds the promise of bringing ________. A) lower cost B) lower agility C) both A and B D) neither A nor B

lower cost

The business benefit of multiplexing is ________. A) lower cost B) higher speed C) avoiding the need to send many transmission links through narrow conduits D) security

lower cost

The general term for evil software is ________.

malware

How did the Target attackers obtain the stolen information? a) directly from the POS terminals b) from the vendor service server c) from the POS software download server d) none of the above

none of the above

How many bytes will it take to transmit "Brain Dead" without the quotation marks? A) 2 B) 3 C) 9 D) none of the above

none of the above

If a destination host does not receive a segment, it will ________. A) transmit an ACK segment B) transmit a NAC segment C) transmit an RSND segment D) none of the above

none of the above

If a destination host does not receive a segment, it will ________. A) transmit an ACK segment B) transmit an NAC segment C) transmit an RSND segment D) none of the above

none of the above

If a destination host receives an incorrect segment, it will ________. A) transmit an ACK segment B) transmit an NAC segment C) transmit an RSND segment D) none of the above

none of the above

If a packet is highly suspicious but not a provable attack packet, an ________ may drop it.

none of the above

In decimal, the binary number 110 is ________. A) 15 B) 16 C) 17 D) none of the above

none of the above

In distributed DoS attacks, the attacker sends messages directly to ________. a) bots b) the intended victim of the DoS attack c) a DOS server d) none of the above

none of the above

The digital certificate provides the ________. A) private key of the supplicant B) private key of the true party C) public key of the supplicant D) none of the above

none of the above

Which of the following reduces momentary traffic peaks by controlling how much traffic is allowed into the network? a) overprovisioning b) priority c) QoS guarantees D) none of the above

none of the above

Which standards layer governs e-mail? A) data link B) transport C) Internet D) none of the above

none of the above

Which standards layer governs multiuser word processing programs? A) data link B) transport C) Internet D) none of the Above

none of the above

Which standards layer governs peer-to-peer file sharing? A) data link B) transport C) Internet D) none of the Above

none of the above

Which standards layer governs the World Wide Web? A) data link B) transport C) Internet D) none of the Above

none of the above

Communication between SDN applications and SDN controllers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

northbound APIs

"Octet" is the same as ________. A) "bit" B) "byte" C) either A or B, depending on the context D) neither A nor B

"byte"

If two hosts are connected by five networks, how many routers will there be when one host sends a packet to the other host? A) 1 B) 2 C) 4 D) 5

4

The UDP header has ________ fields. A) 4 B) 8 C) 16 D) 32

4

Which of the following is an integer? A) 4,307 B) 45.7 C) both A and B D) neither A nor B

4,307

Which of the following is an integer? A) 5,280 B) 98.6 C) both A and B D) neither A nor B

5,280

Which core diameter is used in multimode fiber? A) 50 microns B) 8 microns C) 50 mm D) 8 mm

50 microns

A host sends a packet to another host containing six single networks along the way. How many data links are used for this transmission? A) 1 B) 6 C) 7 D) 8

6

To prevent an unauthorized user from sending supervisory commands to switches, companies use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE

802.1AE

To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use __________. A) 802.1X B) SNMP C) VLANs D) 802.1AE

802.1X

What 802 Working Group creates Ethernet standards? A) 802.1 B) 802.2 C) 802.3 D) 802.11

802.3

To deliver IPv4 packets, routers look at the ________ addresses. A) dotted decimal notation B) EUI-48 C) IPv4 D) all of the above

IPv4

________ addresses are 32 bits long. A) IPv4 B) IPv6 C) EUI-48 D) none of the above

IPv4

At what layer will you find standards for routers? A) transport B) Internet C) both A and B D) neither A nor B

Internet

Internet communication that does not involve a human is referred to with the term ________. A) World Wide Web B) impersonal C) anonymous D) IoT

IoT

The Mirai bots in the KrebsOnSecurity.com attack were ________. A) client hosts B) server hosts C) IoT devices D) all of the above

IoT devices

Which of the following tells you the cumulative round-trip latency to each router along the route to the host? A) Ping B) Traceroute C) both A and B D) neither A nor B

Traceroute

Malware programs that masquerade as system files are called ________.

Trojan Horses

T/F A TCP segment can both send information and acknowledge an earlier message sent to its host.

True

T/F A header is defined as everything that comes before the data field.

True

T/F A trailer is defined as everything that comes after the data field.

True

T/F Biometrics, and other new authentication methods, are being created with the goal of getting rid of reusable passwords.

True

T/F HTTP is a connectionless protocol.

True

T/F If you change a standard at one layer, you are not required to change standards at other layers.

True

Which of the following provides security in Ethernet? A) RSTP B) SNMP C) VLANs D) all of the above

VLANs

To handle momentary traffic peaks, which would you give higher priority to? A) e-mail B) VoIP C) both A and B D) It is impossible to say with the information provided.

VoIP

If a destination host receives a correct segment, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing

an ACK segment

A spear phishing attack is usually aimed at ________.

an individual

At what layer is encoding done? A) application B) transport C) Internet D) none of the above

application

On a server, well-known port numbers indicate ________. A) applications B) connections with client computers C) both A and B D) neither A nor B

applications

In SDN, applications ________. A) increase network management labor B) are required to make SDN work effectively C) both A and B D) neither A nor B

are required to make SDN work effectively

SNMP Get commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B

ask agents for information about the managed device

Electronic signatures provide message-by-message ________.

authentication

Requiring someone prove his or her identity is ________.

authentication

From a security perspective, the Internet's ability to give access to nearly everyone is a ________. A) good thing B) bad thing C) both A and B D) neither A nor B

bad thing

Which of the following is a host when it's on a network? A) a client PC B) a server C) a mobile phone D) all of the above

all of the above

Which of the following is constantly leading to new applications? A) increasing speed B) increasing reliability C) increasing availability wherever you are D) all of the above

all of the above

The strength of a wave is its ________.

amplitude

Physical layer standards govern ________. a) signaling b) physical connectors c) both A and B d) neither A nor B

both A and B

Who mounts APTs today? a) national governments b) cybercriminals c) both A and B d) neither A nor B

both A and B

Attack programs that can be remotely controlled by an attacker are ________.

bots

Which of the following can be upgraded after it is installed on a victim computer (choose the most specific answer)?

bots

In HTTP, which program may initiate communication? A) browser B) Webserver program C) both A and B D) neither A nor B

browser

In an HTTP, which one (browser or Webserver application program) transmits message first? A) browser B) Webserver application program C) They transmit simultaneously. D) It depends on the situation.

browser

ISPs usually offer QoS guarantees to ________. A) residential customers B) business customers C) both A and B D) neither A nor B

business customers

NGFWs ________. A) can implement different rules for different applications B) base server decisions on port numbers C) both A and B D) neither A nor B

can implement different rules for different applications

What type of attacker are most attackers today?

career criminals

Trunk links connect switches to ________ switches. A) core B) workgroup C) both A and B D) neither A nor B

core

What type of switch connects switches to other switches?

core switches

In authentication, ________ are the general name for proofs of identity.

credentials

Which of the following were able to recoup most of the money they lost from Target?

credit card companies

In the Ethernet II frame, the IP packet is carried in the ________ field. A) source address B) destination address C) data D) EtherType

data

At what layer will you find standards for frames? A) application B) data link C) transport D) Internet

data link

In an SPI firewall, all rules except the last will permit the connection. The last will ________.

deny the connection

The final router in a route sends the packet being routed in a frame addressed to the ________. A) next-hop router B) destination host C) local router D) default router

destination host

Which of the following can spread very rapidly? A) directly-propagating viruses B) directly-propagating worms C) both A and B D) neither A nor B

directly-propagating viruses

If the destination internet process detects an error, it ________. A) discards the packet B) sends back a segment notifying the sender C) both A and B D) neither A nor B

discards the packet

When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall, the firewall ________.

drops the packet

2500 is in the range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B

ephemeral

The range of port 1024 to port 4999 is the usual range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B

ephemeral

Firewall log files should be read ________.

every day

To span the distance between two switches, why is adding an intermediate switch not an attractive choice?

expense

Advanced persistent threats are ________.

extremely dangerous for the victim

TCP has single-bit fields in its headers; these single-bit fields are called ________ fields. A) port B) flag C) ACK D) binary

flag

Optical fiber cords use two strands ________. A) for reliability through redundancy B) to form a complete electrical loop C) to double the transmission speed D) for full-duplex transmission

for full-duplex transmission

Routing packets is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control

forwarding

Source and destination EUI-48 addresses are found in ________ headers. A) IP B) frame C) TCP D) UDP

frame

Ethernet messages are ________.

frames

The ability to transmit in two directions simultaneously is ________.

full-duplex communication

A message always has a ________. A) header B) data field C) both A and B D) neither A nor B

header

SYN segments have ________. A) headers B) headers and data fields C) headers, data fields, and trailers D) data fields only

headers

TCP control segments normally have ________. A) headers B) headers and data fields C) headers, data fields, and trailers D) none of the above

headers

Ethernet has reliability issues because of its ________. A) too-simple switch operation B) hierarchical organization C) both A and B D) neither A nor B

hierarchical organization

In Ethernet, switches are organized in a ________.

hierarchy

Error rates can soar when the network traffic level is at a(n) ________. A) high level B) fluctuating level C) unregulated level D) none of the above

high level

We call any device connected to the Internet a(n) ________. A) IP B) client C) router D) host

host

In which type of attack does the attacker gather extensive sensitive personal information about its victim?

identity theft

Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________. A) rated speed B) aggregate throughput C) individual throughput D) all of the above

individual throughput

Users typically can eliminate a vulnerability in one of their programs by ________.

installing a patch

Network standards provide ________. A) strobing B) synchronization C) interoperability D) entanglement

interoperability

A firewall will drop a packet if it ________.

is a definite attack packet

Using RSTP to provide backup links in Ethernet ________. A) is automatic B) is simple C) is challenging D) is impossible

is challenging

Using SSL/TLS for Web applications is attractive because SSL/TLS ________.

is essentially free to use

If a host cannot reach a DNS server, it ________. A) cannot have a host name B) will have to rely on host names C) will need to use a DHCP server D) is unlikely to be able to communicate with most server hosts

is unlikely to be able to communicate with most server hosts

Facial recognition is controversial because ________.

it can be used surreptitiously

Fingerprint recognition is generally acceptable for ________.

laptops

When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________. A) latency B) output C) jitter D) throughput

latency

Digital certificate authentication fails if the supplicant ________.

learns the true party's private key

Compared to NGFWs, IDSs ________. A) look for different threats B) look for the same threats C) look for the same threats but do so differently D) none of the above

look for different threats

Ethernet became the dominant LAN technology because of ________.

low cost

SPI firewalls are attractive because of their ________.

low cost

Stateful packet inspection firewalls are attractive because of their ________.

low cost for a given traffic volume

________ is the most frequent type of company attack.

malware

Compared to priority, overprovisioning capacity can reduce ________. A) equipment cost B) management labor C) both A and B D) neither A nor B

management labor

An SLA specifies ______. A) maximum jitter B) minimum jitter C) both A and B D) neither A nor B

maximum jitter

An SLA specifies _______. A) maximum latency B) minimum latency C) both A and B D) neither A nor B

maximum latency

If throughput falls substantially below a QoS guaranteed speed, the ISP ________. A) always pays a penalty B) may pay a penalty C) does not pay a penalty D) may renegotiate the QoS guarantee for speed

may pay a penalty

Electronic signatures also provide ________ in addition to authentication. A) message integrity B) message encryption C) both A and B D) neither A nor B

message integrity

Latency is usually measured in ________. A) bits per second (bps) B) milliseconds (ms) C) minutes of downtime D) none of the above

milliseconds (ms)

An SLA specifies __________. A) maximum availability B) minimum availability C) both A and B D) neither A nor B

minimum availability

An SLA specifies the _________. A) maximum speed B) minimum speed C) both A and B D) neither A nor B

minimum speed

To determine if a host is reachable, you send a(n) ________. A) SNMP SET command B) MIB C) trap D) ping

ping

The two tag frames provide information about ________.

priority

Standards mean the same thing as ________. A) semantics B) syntax C) rules D) protocols

protocols

Which of the following usually has higher availability? A) data networks B) public switched telephone network (PSTN) C) Both of the above usually have equal availability. D) neither A nor B

public switched telephone network (PSTN)

UTP categories rate the ________ of UTP cabling. A) quality B) speed C) quality-of-service performance D) error performance

quality

Most servers are ________. A) mainframes B) Windows PCs C) rack servers D) routers

rack servers

On the Internet, a ________ host usually gets a static IP address. A) client B) server C) both A and B D) neither A nor B

server

________ links connect switches to other switches.

trunk

In most encryption, keys must be at least ________ long to be considered safe.

128 bits

How long (in milliseconds) is a clock cycle if I transmit 400 Mbps with four states?

.000005

What is binary 0000 in hex?

0

A host sends a packet to another host containing seven single networks along the way. How many other hosts will there be along the route when Host A transmits? A) 1 B) 2 C) 7 D) 9

1

A host sends a packet to another host containing six single networks along the way. How many routes are included in this transmission? A) 1 B) 6 C) 7 D) 8

1

A host sends a packet to another host with six single networks along the way. How many packets are involved in this transmission? A) 1 B) 6 C) 7 D) 8

1

If someone says that a 1-bit flag is set, it is given the value ________. A) 0 B) 1 C) either 0 or 1 D) neither 0 or 1

1

If two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 7

1

If you double the number of states, you can transmit ________ more bit(s) per clock cycle.

1

In a point-to-point single network, how many physical links will there be when a packet is transmitted? A) 0 B) 1 C) 2 D) We cannot say with the information provided.

1

In large Ethernet networks, there can be ________ possible data links between two hosts.

1

CAT 5e and CAT 6 wiring can carry Ethernet traffic 100 meters up to ________. A) 10 Mbps B) 100 Mbps C) 1 Gbps D) 10 Gbps

1 Gbps

How many alternatives can you represent with a 10-bit field? A) 256 B) 512 C) 1,024 D) none of the above

1,024

In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. If you and three others are transmitting or receiving at the same time, what speed should you expect to get? A) 0.5 Mbps B) 1 Mbps C) 1.25 Mbps D) none of the above

1.25 Mbps

If you have 10 sites connected by 7 transmission links, how many rows of traffic data will you have in your traffic table? A) 7 B) 10 C) 14 D) 20

10

Convert decimal 8 to binary. A) 100 B) 1000 C) 10000 D) 111

1000

What is 9 hex in binary?

1001

Two switches that are 200 m apart at a speed of 20 Gbps should be connected using ________. A) 10GBASE-SR B) 100GBASE-SR C) 10GBASE-SR with bonding D) 100GBASE-SR with bonding

10GBASE-SR with bonding

During a connection opening, how many TCP segments will the side that initiates the connection send? A) 1 B) 2 C) 3 D) 4

2

If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12

2

What is binary 0010 in hex?

2

The five senses can be represented with a ________-bit field. A) 2 B) 3 C) 4 D) 5

3

A 5-bit field can represent ________ alternatives or different combinations. A) 8 B) 16 C) 32 D) 64

32

IPv4 addresses are ________ bits long. A) 32 B) 64 C) 128 D) none of the above

32

In IP, the first bit in the second row is ________. A) 0 B) 31 C) 32 D) none of the above.

32

To transmit five bits per clock cycle, you must have ________ states. A) 5 B) 16 C) 32 D) none of the above

32

A system with 16 states can transmit ________ bits per clock cycle A) 3 B) 4 C) 5 D) none of the above

4

If two hosts are connected by five point-to-point networks, how physical links will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 6

6

In TCP, port number fields are 16 bits long. How many possible port numbers are there? A) 16 B) 1,024 C) 16,384 D) 64,536

64,536

If you have 10 sites connected by 7 transmission links, how many columns will you have in your traffic table? A) 7 B) 10 C) 14 D) 20

7

To represent 65 alternatives, your alternatives field would have to be at least ________ bits long. A) 5 B) 6 C) 7 D) 8

7

Transmitting "Oh, My!" without the quotes in ASCII requires ________ octets. A) 2 B) 4 C) 6 D) 7

7

How many wires are there is a UTP Ethernet cord?

8

________ links connect users to workgroup switches. A) Trunk B) Core C) Access D) Workgroup

Access

Secured packets typically receive ________. a) confidentiality b) authentication c) message integrity d) all of the above

All of the Above

Authentication should generally be ________. A) as strong as possible B) appropriate for a specific resource C) the same for all resources D) different for every different resource

Appropriate for a specific resource

________ is the percentage of time that a network is available for use. A) Availability B) Downtime C) QoS D) none of the above

Availability

Which UTP quality levels are needed to send signals 100 meters at 10 gigabits per second? A) category 6 B) category 6A C) both A and B D) neither A nor B

Category 6A

Which of the following has better access point capabilities? A) Home access routers B) Corporate access points C) Both have about the same access point capabilities.

Corporate access points

________ attackers are often well-funded. A) Disgruntled employee B) Cybercriminal C) both A and B D) neither A nor B

Cybercriminal

________ look at ________, while ________ mostly look at ________. A) Antivirus programs; packets; firewalls; packets B) Antivirus programs; files; firewalls; files C) Antivirus programs; packets; firewalls; files D) Antivirus programs; files; firewalls; packets

D) Antivirus programs; files; firewalls; packets

Which of the following is an Internet supervisory protocol? A) DNS B) IP C) both A and B D) neither A nor B

DNS

Which is NOT in an IP packet? A) Internet header B) Transport header C) Data link header D) All of the above are part of the IP packet.

Data link header

________ describe light entering a fiber's core at different angles. A) Co-cycle waves B) Harmonics C) Divergences D) Different modes

Different modes

Flooding a host with traffic so that it cannot serve its legitimate users is a ________ attack. A) hacking B) virus C) malware D) DoS

DoS

Ethernet uses ________ addresses. A) IPv4 B) IPv6 C) MAC D) EUI-48

EUI-48

Wi-Fi uses ________ addresses. A) IPv4 B) IPv6 C) MAC D) EUI-48

EUI-48

________ is the official name for Ethernet addresses.

EUI-48

The ARP cache gives the ________ of a router the host will send a packet to. A) IP address B) EUI-48 address C) MAC address D) host name

EUI-48 address

After an ARP cache poisoning attack, the ARP cache gives the ________.

EUI-48 address of the router the MITM attacker

To know what kind of message is in the Ethernet II data field, the receiver must look in the ________ field. A) source address B) destination address C) data D) EtherType

EtherType

At what layer will you find standards for packets? A) application B) data link C) transport D) Internet

Internet

T/F Hacking is defined as using a computer resource without authorization or in excess of authorization.

FALSE. missing "Intentionally"

T/F "Header" means the same thing as "Header Field."

False

T/F A DHCP server to assigns the client host the same IP address each time.

False

T/F A switch knows the entire data link between the source and destination hosts.

False

T/F All Ethernet switches are manageable.

False

T/F All data link addresses are EUI-48 addresses.

False

T/F Ethernet syntax is displayed 32 bits on a line.

False

T/F HTTP is a reliable protocol.

False

T/F In SNMP, the manager communicates directly with the managed device

False

T/F Only applications from the IETF are likely to be able to run over TCP.

False

T/F Priority is a way to handle a chronic lack of capacity.

False

T/F The application layer processes application message fragmentation.

False

T/F The client program is usually a browser.

False

T/F The originating host needs to contact the DNS server each time it sends a packet to the target host.

False

T/F The server program is always a webserver program.

False

T/F The switch knows the type of device it is forwarding a frame to.

False

T/F The transport process always fragments the application message.

False

T/F There is always a data field in a message.

False

Which standards agency is especially important for Internet supervisory processes? A) ISO and ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B are important.

IETF

________ have DHCP servers. A) Home access routers B) Internet core routers C) both A and B D) neither A nor B

Home access routers

________ have access points. A) Home access routers B) Internet core routers C) both A and B D) neither A nor B

Home access routers

When Host A wishes to talk with Host B, the DHCP server provides the IP address of ________. A) Host A B) DNS server C) Host B D) all of the above

Host A

When Host A wishes to communicate with Host B, a DNS server provides the IP address of ________. A) Host A B) the DNS server C) Host B D) none of the above

Host B

Which of the following is the most frustrating to use? A) IDSs B) opaque filtering C) SPI firewalls D) NGFW firewalls

IDSs

What organization (most specifically) creates Ethernet standards?

IEEE

Which of the following is a standards agency for the Internet? A) IETF B) ISO C) both A and B D) neither A nor B

IETF

Which standards agency creates Internet standards? A) OSI B) TCP/IP C) ITU-T D) IETF

IETF

Which standards agency is especially important for internet processes? A) ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B are important.

IETF

Which standards agency is especially important for transport processes? A) ISO and ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B are important.

IETF

Source and destination IP addresses are found in the ________ header. A) IP B) Frame C) TCP D) all of the above.

IP

Which of the following is a connectionless protocol? A) IP B) TCP C) both A and B D) neither A nor B

IP

Routing is based on a(n) ________. A) IP address B) single-network address C) either A or B D) neither A nor B

IP address

Which standards agency is especially important for data link processes? A) ISO and ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B are important.

ISO and ITU-T

A standards agency for OSI is ________. A) ITU-T B) IETF C) both A and B D) neither A nor B

ITU-T

Which of the following is a standards agency? A) OSI B) TCP/IP C) ITU-T D) all of the above

ITU-T

Which standards agency is especially important for physical transmission processes? A) ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B are important.

ITU-T

At what layer will you find standards for IP addresses? A) application B) data link C) transport D) Internet

Internet

Who are the most dangerous types of employees?

It security employees

Variability in delay is called ________. A) jitter B) variance C) a QoS failure D) latency

Jitter

Ethernet addresses were formerly called ________ addresses.

MAC

QoS is quantified through ________. A) criteria B) consensus C) metrics D) none of the above

Metrics

________ occurs when the light energies of two pulses arrive at the far end at overlapping times. A) Multimode transmission B) Modal bandwidth C) Modal dispersion D) Modal interference

Modal dispersion

________ can be addressed by using priority. A) Chronic lacks of capacity B) Momentary traffic peaks C) both A and B D) neither A nor B

Momentary traffic peaks

Which type of firewall filtering collects streams of packets to analyze them as a group? A) SPI B) NGFW C) both A and B D) neither A nor B

NGFW

Which type of firewall filtering looks at application-layer content?

NGFW

Which type of firewall is more expensive per packet handled?

NGFW

EUI-48 addresses in expressed in hexadecimal notation if used by ________. a) switches b) routers c) both A and B d) neither A nor B

Neither A nor B

What is the quality designator for multimode optical fiber? A) Cat B) OM C) both A and B D) neither A nor B

OM

________ fiber is being sold today. A) OM2 B) OM4 C) both A and B D) neither A nor B

OM4

Which of the following is true? A) Frames are carried inside packets. B) Packets are carried inside frames. C) both A and B D) neither A nor B

Packets are carried inside frames

Internet standards are published as ________. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols

RFCs

4-pair UTP terminates in a(n) ________ connector. A) USB B) RJ-45 C) SC D) standard telephone

RJ-45

In SDN, which device manages the control function for individual devices? A) SNMP manager console B) forwarding device itself C) SDN policy server D) SDN controller

SDN controller

Guarantees for quality of service are called ________. A) QoS-G B) QoS metrics C) SLAs D) QoS guarantees

SLAs

To manage their Ethernet networks, companies rely on ________.

SNMP

Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. A) ACK B) SYN C) SYN/ACK D) none of the above

SYN/ACK

The SNMP ________ command changes how managed devices operate. A) Get B) Set C) both A and B D) neither A nor B

Set

________ is the general name for malware on a user's PC that collects sensitive information and sends this information to an attacker.

Spyware

________ is the dominant firewall filtering method used on main border firewalls today. A) ACL filtering B) Application content filtering C) Stateful packet inspection D) NGFW

Stateful packet inspection

Which of the following protocols is reliable? A) IP B) TCP C) both A and B D) neither A nor B

TCP

In general, what should an employer do whenever an employee leaves the firm?

Their accounts should be disabled instantly

Why are employees especially dangerous?

They are trusted

________ are full programs.

Worms

________ is a program that can capture passwords as you enter them.

a keystroke logger

ARP cache poisoning is ________. A) a DoS attack B) a DDoS attack C) an illegal login attack D) a man-in-the middle attack

a man-in-the-middle attack

In digital signaling, there is (are) ________ state(s). A) one B) only two C) a small number of D) an infinite number of

a small number of

________ is a flaw in a program that permits a specific attack or set of attacks. A) Malware B) A security error C) A vulnerability D) A security fault

a vulnerability

________ is the general name for a security flaw in a program. A) A virus B) Malware C) A security fault D) A vulnerability

a vulnerability

Which of the following is NOT one of the three general parts of messages? A) address field B) header C) data field D) trailer

address field

In antivirus filtering, the best ways to filter currently use ________. A) application awareness B) stateful inspection C) signature detection D) behavioral detection

behavioral detection

It is typically advantageous to change a standard if the layer ________ gets an upgraded standard.

below it

In the name Internet, "inter" means ________. A) between B) interior C) international D) interplanetary

between

Using bodily measurements for authentication is ________. A) illegal B) biometrics C) mandatory for good security D) all of the above

biometrics

Antivirus programs are designed to detect ________. a) viruses b) worms c) both A and B d) neither A nor B

both A and B

When a source host sends a packet to a destination host, there will probably be ________ along the way. A) more routes B) more data links C) about the same number of routes and data links D) all of the above

more data links

If a destination host receives a TCP segment with an error, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing

nothing

A local area network operates ________.

on a customer premises

After the side wishing to close a TCP connection sends a FIN segment, it will ________. A) not send any more segments B) only send ACK segments C) only send FIN segments D) none of the above

only send ACK segments

In 4-pair UTP, what is twisted?

pairs of wires

How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP segment that contains an acknowledgement?

pass it if it is part of an approved connection

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually ________.

passes the packet

Pieces of code that are executed after the virus or worm has spread are called ________.

payloads

At what layer is the 100BASE-TX standard? A) physical B) data link C) Internet D) physical and data link

physical

Ethernet standards are specified at the ________ layer. a) physical b) Internet c) both A and B d) neither A nor B

physical

Which layer governs wires?

physical

In a single switched network, a ________ connects consecutive switches. A) physical link B) data link C) route D) none of the above.

physical link

UTP and fiber distance limits are for ________. A) physical links B) data link C) Internet routes D) physical and data link

physical links

In a ________ attack, the attacker encrypts some or all of the victim's hard drive.

ransom

DoS attacks attempt to ________.

reduce the availability of a computer

Not making all protocols reliable ________. A) reduces cost B) is very dangerous C) is widely viewed as having been a mistake D) none of the above

reduces cost

Having only a single possible path between devices ________.

reduces switching cost

When a frame arrives, the data link process on the destination host ________. A) adds a header B) removes a header C) both A and B D) neither A nor B

removes a header

Which of the following probably suffered the most financial damage from the Target breach?

retailers

Ping tells you ________. a) latency b) round-trip latency c) cumulative latency to each router along the route d) none of the above

round-trip latency

Router forwarding is called ________. A) routing B) switching C) forwarding D) none of the above

routing

The destination socket is 60.171.18.22:161. The destination host is a(n) ________. A) client B) server C) well-known server D) ephemeral server

server

In QoS, the S stands for ________. A) software B) security C) service D) satisfaction

service

For what specific purpose were the 2.5GBASE-T and 5GBASE-T standards developed? A) general growth in demand for Ethernet speed B) serving access points C) to provide lower-cost service than 10G-BASE-T D) none of the above

serving access points

Traditionally, we have told users that passwords ________.

should have a mix of characters

For sensitive assests, reusable passwords ________.

should not be used

If you can span the distance between two switches with either a single optical fiber link or two UTP lengths with an intermediate switch, which should you choose?

single optical fiber link

Fiber that has a core diameter of 8.3 microns is ________.

single-mode fiber

The longest transmission distances are possible with ________. A) USB B) UTP C) single-mode fiber D) multimode fiber

single-mode fiber

What kind of attack is most likely to succeed against a system with no technological vulnerabilities?

social engineering

Adding applications that cannot tolerate jitter may require ________. A) switch upgrades B) improved switch management C) improved security D) all of the above

switch upgrades

Ethernet forwarding devices are ________.

switches

For reusable passwords, NIST now recommends ________.

that passwords be easy to remember

In SDN, a switch receives its forwarding table rules directly from ________. A) the SDN controller B) an SDN management application C) another switch D) an SNMP manager

the SDN controller

For consumers who suffered credit card fraud because of the Target breach and acted quickly, which of the following is true?

the credit card companies did not charge them for fraudulent purchasers

In encryption, what must be kept secret?

the key

For analysis, network administrators usually interact primarily with ________. A) agents B) the MIB C) the network management program D) the network visualization program

the network visualization program

Standards layers provide services directly to ________. A) the next-higher layer B) the next-lower layer C) all layers D) only themselves

the next-higher layer

Throughput is ________. A) the speed a network actually provides to users B) a network's rated speed C) both A and B D) neither A nor B

the speed a network actually provides to users

SNMP agents can initiate ________. A) Get commands B) traps C) both A and B D) neither A nor B

traps

In digital certificate authentication, the supplicant encrypts the challenge message with ________. A) the supplicant's private key B) the verifier's private key C) the true party's private key D) none of the above

the supplicant's private key

The supplicant claims to be ________.

the true party

In digital certificate authentication, the verifier decrypts the challenge message with ________. A) the supplicant's private key B) the true party's private key C) the supplicant's public key D) the true party's public key

the true party's public key

When a user attempts to plug into an Ethernet switch protected by 802.1X, ________.

the user will be required to authenticate himself or herself

If you add one bit to an alternatives field, you can have ________. A) one more alternative B) two more alternatives C) twice as many alternatives D) none of the above

twice

In binary signaling, there is (are) ________ state(s).

two

A debit card is secure because it requires two credentials for authentication-the card itself and a PIN. This is called ________.

two-factor authentication

Ethernet has a Frame Check Sequence Field to check for errors. Ethernet is ________. A) reliable B) unreliable C) both A and B D) neither A nor B

unreliable

IP is ________. A) reliable B) unreliable C) semi-reliable D) unreliable or reliable depending on the situation

unreliable

Depicting the Internet as a cloud symbolizes ________. A) the Internet is amorphous B) the Internet today is too complex to be understandable by humans C) the Internet is too complex for anyone to depict D) users do not have to know how the Internet operates

users do not have to know how the Internet operates

Which of the following attach themselves to other programs? A) viruses B) worms C) both A and B D) neither A nor B

viruses

The distance between two corresponding points in adjacent cycles is the ________. A) frequency B) wavelength C) bandwidth D) span

wavelength

SSL/TLS is used for ________. A) Web applications B) almost all applications C) both A and B D) neither A nor B

web applications

If you see a username and password on a Post-It note that anyone can see on a monitor, is it hacking if you use this information to log in?

yes

You accidentally discover that you can get into other e-mail accounts after you have logged in under your account and only spend a few minutes looking at another user's mail. Is that hacking?

yes

You are concerned with the security of a site you use and run a vulnerability test against it. The test reveals a security threat. Is this hacking?

yes

Vulnerability-based attacks that occur before a patch is available are called ________ attacks. A) indefensible B) stealth C) malware D) zero-day

zero-day

In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps. The throughput is half the rated speed. If each person downloading is getting an average of 200Mbps, how many people are using the Internet at that moment? A) 10 B) 5 C) 2 D) none of the above

5

Convert a decimal number 15 to the binary number. A) It is a binary number. B) 1100 C) 1101 D) 1111

1111

What is F hex in binary? A) 1001 B) 1010 C) 1111 D) none of the above

1111

If there are 10 routers between the source and destination hosts, how may internet processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12

12

ASCII has a 7-bit code. How many keyboard characters can it represent? A) 128 B) 256 C) 512 D) 1,024

128

What is binary 1111 in hex?

15

Convert the binary number 100 to decimal. A) It is in decimal. B) 2 C) 4 D) 8

4

If a physical link can use either 4-pair UTP, multimode fiber, or single-mode fiber, which should I use?

4-pair UTP

What type of copper wiring is widely used in Ethernet?

4-pair UTP

If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 6

5

At what layer will you find standards for routes? A) application B) data link C) transport D) Internet

Internet

What process adds a header in front of a TCP segment? A) Application B) Transport C) Internet D) Data Link

Internet

T/F In a point-to-point single network, there is always the same number of physical and data links.

True

T/F In this book, we use the terms Ethernet and 802.3 interchangeably.

True

T/F TCP is a connection-oriented protocol.

True

T/F The IP standard calls for IP packets to be carried in the Ethernet II version of the Ethernet frame.

True

T/F The internet process checks for errors.

True

The ________ contains the content being delivered by a message. A) address field B) header C) data field D) trailer

data field

At what layer will you find standards for EUI-48 addresses? A) application B) data link C) transport D) Internet

data link

At what layer will you find standards for switches? A) application B) data link C) transport D) Internet

data link

The path a message takes from the source host to the destination device in an Ethernet network is a ________. A) physical link B) data link C) route D) label-switched route

data link

paths across a single network are called ________. A) routes B) data links C) physical links D) none of the above

data links

Network standards ________. A) decrease equipment prices B) prevent the growth of new features C) both A and B D) neither A nor B

decrease equipment prices

SNMP network management ________. A) increases total cost B) does not affect total cost C) decreases total cost D) causes arthritis

decreases total cost

The supplicant is ________. a) the true party b) an impostor c) either A or B d) neither A nor B

either A or B

The Target attackers probably first broke into Target using the credentials of a(n) ________.

employee in a firm outside Target

Converting application messages into bits is called ________. A) encapsulation B) encryption C) encoding D) exchange

encoding

IETF standards typically begin as simple protocols which ________. A) enhances development speed B) prevents longer-term development C) both A and B D) neither A nor B

enhances development speed

NIST guidelines for reusable passwords permit ________.

entirely lower-case passwords

Modal dispersion limits transmission distance in ________. A) multimode fiber B) single-mode fiber C) both A and B D) neither A nor B

multimode fiber

Which of the following is used most often in LANs for fiber transmission links? A) modal bandwidth fiber B) 1.550 nm fiber C) single-mode fiber D) multimode fiber

multimode fiber

Trunk Lines in the Internet core are ________. A) dedicated B) multiplexed C) both A and B D) neither A nor B

multiplexed

Cyberwar attacks are made by ________.

national governments

In general, what type of attackers do the most damage?

national governments

Ethernet standards are specified at the ________ layer. a) Internet b) transport c) both A and B d) neither A nor B

neither A nor B

HTTP is ________. A) connection-oriented. B) reliable C) both A and B D) neither A nor B

neither A nor B

ISO standards are dominant in the OSI-TCP/IP layered standards architecture at the ________ layer. A) transport B) Internet C) both A and B D) neither A nor B

neither A nor B

Jitter is a problem for ________. a) downloading a file attached to an e-mail b) e-mail c) both A and B d) neither A nor B

neither A nor B

Trojan horses can spread by ________. a) e-mailing themselves to victim computers b) directly propagating to victim computers c) both A and B d) neither A nor B

neither A nor B

Which layer(s) governs transmission through the Internet? A) data link B) physical C) both A and B D) neither A nor B

neither A nor B

Which of the following is a socket? A) 80 B) 21 C) both A and B D) neither A nor B

neither A nor B

Which of the following is an architecture? A) ISO B) IETF C) both A and B D) neither A nor B

neither A nor B

Which of the following letters may appear in EUI-48 addresses? a) D b) H c) both A or B d) neither A nor B

neither A nor B

SNMP agents communicate with the ________. A) network visibility program B) network management program C) MIB D) all of the above

network management program

Which of the following is NOT governed by the SNMP standard? a) agents b) MIB c) network management program d) network visibility program

network visibility program

You click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see. You exit without looking around. is that hacking?

no

Who is in charge of the Internet? A) the U.S. Government B) the United Nations C) the IETF D) No one

no one

Who owns the Internet? A) The U.S. Government B) The United Nations C) The IETF D) No one

no one

A TCP message is called a ________. A) datagram B) packet C) frame D) none of the above

none of the above

A packet sent from one host to another over the Internet will ALWAYS pass through ________. A) a single ISP B) more than 2 ISPs C) exactly 2 ISPs D) none of the above

none of the above

A sending host will retransmit a TCP segment if it ________. A) receives an ACK segment B) receives an NAC segment C) receives an RPT segment D) none of the above

none of the above

Four-pair UTP uses ________ connectors. A) reflection at the two ends B) heat conduction C) radiation D) none of the above

none of the above

Communication between SDN controllers and routers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

southbound APIs

Routers and switches must support ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

southbound APIs

The main benefit of parallel transmission over serial transmission is ________. A) reliability B) speed C) both A and B D) neither A nor B

speed

A host with a(n) ________ IP address is easier to find than a host with a ________ IP address. A) dynamic, static B) static, dynamic C) undetermined, static D) undetermined, dynamic

static, dynamic

In authentication, the ________ is the party trying to prove his or her identity.

supplicant

850 nm multimode fiber is used in LANs ________. A) to keep cost low B) to have the longest transmission distances C) both A and B D) neither A nor B

to keep costs low

Signal state is held constant in a clock cycle ________.

to make it easier for the receiver to sample the state

In a single switched network with seven switches between a source and destination host, the source host addresses the frame ________. A) to the first switch B) to the destination host C) to the first router D) to the final switch

to the destination host

Forwarding functions are located in routers in ________. A) traditional operation B) SDN C) both A and B D) neither A nor B

traditional operation

Control is done on individual switches and routers in ________. A) traditional operation B) SDN C) both A and B D) neither A nor B

traditional operations

Which part of a message is included less frequently when compared to the other two parts? A) header B) data field C) trailer D) All of the above are equally included in messages.

trailer

IETF standards are dominant in the OSI-TCP/IP layered standards architecture at the ________ layer. A) data link B) transport C) both A and B D) neither A nor B

transport

The network stack implements the ________ layer process. A) application B) transport C) physical D) data link

transport

What process adds a header in front of an application message or fragment? A) application B) transport C) internet D) data link

transport

Which layer processes application message fragmentation? A) application B) transport C) Internet D) all of the above

transport

Which of the following sometimes uses direct propagation between computers? A) viruses B) worms C) Trojan horses D) downloaders

worms

What type of switch connects users to the network?

workgroup switches


Related study sets

Intro to Psychology All Chapters

View Set

CySA+ Ch 14 Containment, Eradication, and Recovery

View Set

COP3503 Programming Quiz 3 - Lists, Stacks, and Queues

View Set

THE 2023 AP US GOVERNMENT REVIEW

View Set

Employee Rewards and Benefits Exam 3

View Set

Quantitative Analysis - Chapter 2

View Set