Exam 12: Securing Tcp/Ip Environments
Exam 1: Introducing Tcp/Ip50 Questions
Exam 2: Ip Addressing and Related Topics50 Questions
Exam 3: Basic Ip Packet Structures: Headers and Payloads50 Questions
Exam 4: Data Link and Network Layer Protocols in Tcp/Ip50 Questions
Exam 5: Internet Control Message Protocol50 Questions
Exam 6: Neighbors Discovery in Ipv650 Questions
Exam 7: Ip Address Auto Configuration50 Questions
Exam 8: Name Resolution on Ip Networks50 Questions
Exam 9: Tcp/ip Transport Layer Protocols50 Questions
Exam 10: Transitioning From Ipv4 to Ipv6: Interoperation50 Questions
Exam 11: Deploying Ipv650 Questions
Exam 12: Securing Tcp/Ip Environments50 Questions
Exam 13: Available in Mindtap Only: Troubleshooting Tcp/Ip50 Questions
Exam 14: Available in Mindtap Only: Tcp/Ip Best Practices and Practical Applications50 Questions
Select questions type
Which of the following terms means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information?
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
A
Which of the following is a specially "hardened" software service or software/hardware product that erects a barrier to inspect and control traffic flow between networks?
Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
A
Which type of attack includes SYN Flood, broadcast amplification attacks, and buffer overflow?
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
A
Match each item with a statement below.
a.threat
b.remote logon service
c.PING sweep
d.computer forensics
e.port scanner
f.handler
g.session hijacking
h.security policy
i.honeypot
-the process of examining the "footprints" that an attacker leaves behind
(Short Answer)
4.7/5
(34)
Match each item with a statement below.
a.threat
b.remote logon service
c.PING sweep
d.computer forensics
e.port scanner
f.handler
g.session hijacking
h.security policy
i.honeypot
-a special-purpose software tool that cycles through all possible TCP and UDP port addresses looking for open ports that then can be probed for access or exploited for vulnerabilities
(Short Answer)
4.9/5
(44)
A(n) ____________________ consists of creating hashed values for all words in a specialized dictionary of terms, then comparing those values to the hashed values in password files.
(Short Answer)
5.0/5
(33)
Which of the following types of attacks serves the purpose of masquerading as an authorized user in order to gain access to a system?
(Multiple Choice)
4.9/5
(34)
Proxy server software permits internal network addresses to be "translated" into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet.
(True/False)
4.8/5
(35)
Which of the following reveals a system vulnerability and is often documented, either by the manufacturer or by an attacker?
(Multiple Choice)
4.9/5
(39)
Strictly speaking, VPNs use tunneling protocols; therefore, they need to encrypt tunneled traffic.
(True/False)
4.9/5
(35)
Which of the following is an area that's accessible to both outsiders and insiders, but which establishes a buffer area between what's completely inside and outside a network boundary?
(Multiple Choice)
4.8/5
(33)
Which of the following is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer?
(Multiple Choice)
4.9/5
(31)
Which type of attacks are designed to interrupt or completely disrupt operations of a network device or network communications?
(Multiple Choice)
4.7/5
(33)
Which of the following is an undocumented and illicit point of entry into an operating system or application added by a system's programmers to bypass normal security?
(Multiple Choice)
4.9/5
(33)
Briefly describe IP service implementation vulnerabilities, and insecure IP protocols and services.
(Essay)
4.9/5
(43)
A(n) ____________________ model excludes users from access to resources, by default, and then adds whatever users need access to such resources as exceptions to the general exclusionary rule.
(Short Answer)
4.8/5
(37)
Briefly describe the following types of attacks: DoS, man-in-the-middle, and IP service.
(Essay)
4.7/5
(34)
____________________ attacks are DoS attacks that are launched from numerous devices.
(Short Answer)
4.9/5
(31)
In a(n) ____________________ attack, a service is inundated with requests, or malformed service requests, which cause a server to hang or freeze, preventing it from responding to input.
(Short Answer)
4.9/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)