Sei sulla pagina 1di 11

Chapter 9 - TCP/IP Security Exam Review of attempt 1

Top of Form

Finish review
Bottom of Form

Started on

Tuesday, July 19, 2011, 03:35 AM

Completed on

Tuesday, July 19, 2011, 03:43 AM

Time taken

8 mins 6 secs

Marks

24/25

Grade

96 out of a maximum of 100 (96%)

Question1
Marks: 1

In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side. Choose one answer.
a. DoS

b. brute force c. Man-in-the middle d. IP service

Correct Marks for this submission: 1/1.

Question2
Marks: 1

A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses. Choose one answer.

a. agent

b. Trojan c. port scanner d. socket

Correct Marks for this submission: 1/1.

Question3
Marks: 1

Default Lock-Down allows the Windows XP or Windows Server 2003 system to be used as a router and a network address translation (NAT) system. Answer: True False

Correct Marks for this submission: 1/1.

Question4
Marks: 1

The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system. Choose one answer.
a. egress filtering

b. session hijacking c. data authentication d. network sniffing

Correct Marks for this submission: 1/1.

Question5
Marks: 1

A(n) ____ refers to a successful attempt to compromise a systems security.

Choose one answer.


a. discovery

b. exploit c. break-in d. gateway

Correct Marks for this submission: 1/1.

Question6
Marks: 1

A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks. Choose one answer.
a. firewall

b. bastion host c. DMZ d. boundary router

Correct Marks for this submission: 1/1.

Question7
Marks: 1

Trying every likely or possible password for an account is called a(n) ____. Choose one answer.
a. brute force attack

b. user impersonation c. session hijacking

d. packet sniffing

Correct Marks for this submission: 1/1.

Question8
Marks: 1

An attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while its in transit is called ____. Choose one answer.
a. brute force attack

b. user impersonation c. session hijacking d. packet sniffing

Correct Marks for this submission: 1/1.

Question9
Marks: 1

____ are designed to interrupt or completely disrupt operations of a network device or network communications. Choose one answer.
a. Trojan horse attacks

b. Dictionary attacks c. DoS attacks d. Worms

Correct Marks for this submission: 1/1.

Question10
Marks: 1

A ____ is a weak spot or known place of attack on any common operating system, application, or service. Choose one answer.
a. back door

b. hole c. discovery d. hash

Correct Marks for this submission: 1/1.

Question11
Marks: 1

Internet Security IP implementations make it possible to encrypt and protect segments at the Transport layer, thereby protecting the contents of all communications across the Internet at the Transport layer. Answer: True False

Correct Marks for this submission: 1/1.

Question12
Marks: 1

____ is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer. Choose one answer.
a. SA bundle

b. Spyware c. Adware d. Cache

Correct Marks for this submission: 1/1.

Question13
Marks: 1

A ____ is a specially, hardened software service, or a software/hardware product, that erects a barrier to inspect and control traffic flow between networks. Choose one answer.
a. firewall

b. bastion host c. DMZ d. boundary router

Correct Marks for this submission: 1/1.

Question14
Marks: 1

____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities. Choose one answer.
a. Ingress filtering

b. Data authentication c. Network sniffing d. Spoofing

Correct Marks for this submission: 1/1.

Question15
Marks: 1

A ____ is an area thats accessible to both outsiders and insiders, but which establishes a buffer area between whats completely inside and outside a network boundary. Choose one answer.

a. firewall

b. bastion host c. DMZ d. boundary router

Incorrect Marks for this submission: 0/1.

Question16
Marks: 1

Because of TCP/IPs optimistic security model, basic fundamental protocols offer no built-in security controls. Answer: True False

Correct Marks for this submission: 1/1.

Question17
Marks: 1

A(n) ____ documents a vulnerability (i.e., a weakness), usually in the context of a recipe, or by including software tools used to mount an attack. Choose one answer.
a. router

b. exploit c. port d. gateway

Correct Marks for this submission: 1/1.

Question18
Marks: 1

____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature. Choose one answer.
a. SA bundle

b. Spyware c. Adware d. Cache

Correct Marks for this submission: 1/1.

Question19
Marks: 1

A function that provides ____ checks the integrity of each packet individually. Choose one answer.
a. access control

b. connectionless integrity c. data origin authentication d. confidentiality

Correct Marks for this submission: 1/1.

Question20
Marks: 1

____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information. Choose one answer.
a. Access control

b. Connectionless integrity

c. Data origin authentication d. Confidentiality

Correct Marks for this submission: 1/1.

Question21
Marks: 1

A ____ is an undocumented and illicit point of entry into an operating system or application added by a systems programmers to bypass normal security. Choose one answer.
a. back door

b. hole c. discovery d. hash

Correct Marks for this submission: 1/1.

Question22
Marks: 1

A(n) ____ is a kind of virus that eschews most activity except as it relates to self-replication. Choose one answer.
a. Trojan horse

b. dictionary attack c. DoS d. worm

Correct Marks for this submission: 1/1.

Question23

Marks: 1

____ is the ability to verify that the data received did in fact come from the named source. Choose one answer.
a. Access control

b. Connectionless integrity c. Data origin authentication d. Confidentiality

Correct Marks for this submission: 1/1.

Question24
Marks: 1

A stealthy attackermay cover its tracks by deleting log files, or terminating any active direct connections. Answer: True False

Correct Marks for this submission: 1/1.

Question25
Marks: 1

In a(n) ____ attack, a service is inundated with service requests, or malformed service requests cause a server to hang. Choose one answer.
a. DoS

b. brute force c. man-in-the middle d. IP service

Correct Marks for this submission: 1/1.

Top of Form

Finish review
Bottom of Form

Potrebbero piacerti anche