Exam 7: Administering a Secure Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ can be used to determine whether new IP addresses are attempting to probe the network.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

Why is the Physical Layer omitted in the TCP/IP model?

Free
(Essay)
4.8/5
(31)
Correct Answer:
Verified

The Physical Layer is omitted in the TCP/IP model. This is because TCP/IP views the Network Interface Layer as the point where the connection between the TCP/IP protocol and the networking hardware occurs.

What are the two types of community strings?

Free
(Essay)
4.9/5
(37)
Correct Answer:
Verified

There are two types of community strings: a read-only string will allow information from the agent to be viewed, and a read-write string allows settings on the device to be changed.

List and describe the three fields that each ICMP message contains.

(Essay)
4.9/5
(39)

____ provides a greater degree of security by implementing port-based authentication.

(Multiple Choice)
4.9/5
(39)

List the steps in an 802.1x authentication procedure.

(Essay)
4.8/5
(34)

The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number.

(Multiple Choice)
4.9/5
(35)

Discuss the problems associated with storing the entire database of names and IP addresses in one location.

(Essay)
5.0/5
(36)

List the steps of a DNS lookup.

(Essay)
4.9/5
(34)

Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.

(Multiple Choice)
4.9/5
(27)

Broadcast storms can be prevented with ____.

(Multiple Choice)
4.7/5
(40)
Match each term with the correct statement below.
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Smurf DoS attack
Functions by exchanging management information between networked devices
DNS
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Ping of Death
Correct Answer:
Verified
Premises:
Responses:
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Smurf DoS attack
Functions by exchanging management information between networked devices
DNS
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Ping of Death
Substitutes addresses so that the computer is automatically redirected to another device
ICMP
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Network discovery
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
STA
Used by devices to communicate updates or error information to other devices
SNMP
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
DNS poisoning
(Matching)
4.9/5
(32)

DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.

(Multiple Choice)
4.9/5
(38)

IEEE 802.1x is commonly used on wireless networks.

(True/False)
4.8/5
(32)

____ is a pay-per-use computing model in which customers pay only for the computing resources they need.

(Multiple Choice)
4.9/5
(35)

TCP port ____ is the FTP control port used for passing FTP commands.

(Multiple Choice)
4.7/5
(36)

A ____ can create entries in a log for all queries that are received.

(Multiple Choice)
4.9/5
(31)

Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.

(True/False)
4.8/5
(28)

____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

(Short Answer)
4.8/5
(33)

A(n) ____________________ is a record of events that occur.

(Short Answer)
4.7/5
(31)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)