Deck 11: Securing Your Network
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 11: Securing Your Network
1
____ can translate an IP address from a private network to a different address used on a public network or the Internet.
A)IPSec
B)DHCP
C)TCP/IP
D)NAT
A)IPSec
B)DHCP
C)TCP/IP
D)NAT
D
2
____ goes to the source of the TCP/IP communications by securing IP in its Network layer, or Layer 3.
A)SSL
B)TLS
C)IPSec
D)RSA
A)SSL
B)TLS
C)IPSec
D)RSA
C
3
Application level gateways are restricted to a single level of filtering.
False
4
You can configure Windows Firewall for any network connection.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
In ____ routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.
A)source
B)destination
C)fast
D)designated
A)source
B)destination
C)fast
D)designated
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Virtual private networks (VPNs)can be set up to provide secure remote communications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
On the sending computer using IPSec, the data is encrypted at the ____ layer.
A)Transport
B)Presentation
C)Session
D)Application
A)Transport
B)Presentation
C)Session
D)Application
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following organizations sponsors the Certified Information Systems Security Professional (CISSP)certification program?
A)American Society for Industrial Security (ASIS)
B)InfraGard
C)Information Systems Security Association (ISSA)
D)Information Security Forum (ISF)
A)American Society for Industrial Security (ASIS)
B)InfraGard
C)Information Systems Security Association (ISSA)
D)Information Security Forum (ISF)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Stateless filtering screens on the basis of the context of the communication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
A(n)____ is information that a Web server stores on a client computer, such as the client's preferences when accessing a particular Web site, or where the client has been on the Web site.
A)applet
B)cookie
C)scanner
D)listener
A)applet
B)cookie
C)scanner
D)listener
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system.
A)remote procedure call
B)virus
C)error handler
D)hoax
A)remote procedure call
B)virus
C)error handler
D)hoax
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ is unrequested e-mail that is sent to hundreds, thousands, or even millions of users.
A)Freeware
B)Adware
C)Spam
D)Malware
A)Freeware
B)Adware
C)Spam
D)Malware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.
A)gateway
B)router
C)switch
D)hub
A)gateway
B)router
C)switch
D)hub
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.
A)Data Link
B)Transport
C)Network
D)Physical
A)Data Link
B)Transport
C)Network
D)Physical
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Attacks on wireless networks are sometimes called ____ -drives because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.
A)war
B)battle
C)spy
D)surveillance
A)war
B)battle
C)spy
D)surveillance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Network devices such as switches use ____, so that when there is heavy network traffic, they have a means to store data until it can be forwarded to the right destination.
A)magnetic disks
B)registers
C)buffers
D)CD-ROMs
A)magnetic disks
B)registers
C)buffers
D)CD-ROMs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ engineering, in relation to computer system attacks, refers to the use of human interaction to gain access to a system or to do damage.
A)Social
B)Psychological
C)Interpersonal
D)Communications
A)Social
B)Psychological
C)Interpersonal
D)Communications
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
On a UNIX/Linux system, IPSec can be configured using the ____ function with the spdadd instruction in a shell script.
A)attributes()
B)standards()
C)encrypt()
D)setkey()
A)attributes()
B)standards()
C)encrypt()
D)setkey()
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
The Trojan horse named ____ is designed to give the attacker the target's user account and password.
A)NetBus
B)Backdoor.IRC
C)Yoink
D)Trojan.Idly
A)NetBus
B)Backdoor.IRC
C)Yoink
D)Trojan.Idly
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Identify five border points that the strongest border security is designed to protect.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Identify five Microsoft Routing and Remote Access Services that enable or manage remote access to Windows Server 2003.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
_________________________ is designed to "provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality" (as defined in the network standard document, RFC 2406).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
A(n)_________________________ is a portion of a network that exists between two or more networks that have different security measures in place.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ storage is employed by a computer system to house frequently used data for quick access.
A)RAM
B)Register
C)Cache
D)CD-ROM
A)RAM
B)Register
C)Cache
D)CD-ROM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
To ensure that the IPTables service starts automatically each time you boot the operating system, use the ____ command.
A)service iptables start
B)chkconfig --level 345 iptables on
C)chkconfig ipchains off
D)/sbin/service iptables save
A)service iptables start
B)chkconfig --level 345 iptables on
C)chkconfig ipchains off
D)/sbin/service iptables save
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
The NAT setup offers addresses in the ____ range as the default option.
A)10.0.0.0
B)172.16.0.0
C)192.168.0.0
D)224.0.0.0
A)10.0.0.0
B)172.16.0.0
C)192.168.0.0
D)224.0.0.0
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are the main elements involved in a wireless network attack?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer, such as a Web server.
A)network
B)presentation
C)presentation
D)circuit
A)network
B)presentation
C)presentation
D)circuit
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
A set of filtering rules, called a ____, is applied to packets through the use of IPTables.
A)link
B)group
C)cluster
D)chain
A)link
B)group
C)cluster
D)chain
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Provide a description of service packs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
A DoS attack that floods a host with packets from many bogus source addresses is a form of ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Identify four tasks that can be fulfilled by a proxy server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Identify four network hardening techniques.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
If you want to block access to Telnet using a firewall, then consider blocking TCP/UDP port ____.
A)21
B)23
C)80
D)119
A)21
B)23
C)80
D)119
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
How does a source routing attack work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
How does a buffer attack work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the advantages of using Network Address Translation (NAT)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Provide a general description for how routers are used in border security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck