Exam 9: Hacking Network Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To decide the quickest, most efficient path for a packet to reach its destination, a(n) ____________________ is maintained within a router.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

route table

The default password for Cisco routers is ____________________.

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

admin/admin

The user interacting via the proxy server is hidden, but can be traced through the log stored on the proxy server.

Free
(True/False)
4.7/5
(39)
Correct Answer:
Verified

True

Networking devices allow the computers on a network to interact with each other.

(True/False)
4.8/5
(31)

Why should you configure different admin passwords for all your routers and switches?

(Essay)
4.9/5
(41)

A proxy server is hard to use since it is usually not included in router or firewall software.

(True/False)
4.8/5
(33)

The attacks made through proxy servers include buffer overflow attacks, denial-of-service attacks, and ____ attacks.

(Multiple Choice)
4.9/5
(41)

What are some of the functions performed by proxy servers?

(Essay)
4.7/5
(30)

____________________ works like a DoS, but the attack comes from many IP addresses, so the defense is more complicated.

(Short Answer)
4.8/5
(38)

Hackers can perform many attacks on routers and switches even if they cannot get into the building and set themselves up as a system administrator.

(True/False)
4.9/5
(40)

____ are a form of logical network segmentation.

(Multiple Choice)
5.0/5
(39)

____ are often considered the ultimate one-point solution for securing networks from both internal and external threats.

(Multiple Choice)
4.9/5
(37)

Networking software can be divided into three categories: security software, ____ software, and transport software.

(Multiple Choice)
4.7/5
(40)

What are the categories of firewall attacks?

(Essay)
4.9/5
(45)

A network can be divided into two main areas: networking software and networking ____.

(Multiple Choice)
4.7/5
(28)

Routers and switches both segment a network, and all can filter packets.

(True/False)
5.0/5
(36)

The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious code from entering a network.

(Short Answer)
4.9/5
(36)

In a(n) ____________________ attack, the hacker transmits a large quantity of packets to the router for it to determine an effective and efficient path for transfer.

(Short Answer)
4.8/5
(32)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)