Deck 7: Designing a Secure Wireless Network

Full screen (f)
exit full mode
Question
____ IP addresses are designed to be used only on a private internal network and cannot be used on the Internet.

A) Public
B) Routable
C) Routing
D) Private
Use Space or
up arrow
down arrow
to flip the card.
Question
____ are usually created by grouping together computers by Internet protocol (IP) addresses.

A) Segment domains
B) Collision domains
C) Subnets
D) Network segments
Question
____ is used to create smaller segments for security purposes.

A) CSMA/CA
B) CSMA/CD
C) Ethernet
D) Segmentation
Question
In a standard wired Ethernet network, all devices share the same media and a device can send a packet at any time rather than in a fixed or predictable fashion (known as ____ networking).

A) deterministic
B) sequential
C) polling
D) non-deterministic
Question
One standard for marking VLAN packets is the IEEE ____ standard.

A) 802.1q
B) 802.1r
C) 802.1v
D) 802.1z
Question
Security by obscurity is sometimes criticized as being too weak.
Question
IEEE 802.11 WLANs have more collisions than wired Ethernet networks.
Question
When a sending device on a LAN sends a packet that is intended for a single receiving device it is known as a ____ transmission.

A) multicast
B) unicast
C) broadcast
D) linecast
Question
____ is the practice of dividing the network into smaller units.

A) Switching
B) Segmentation
C) VLANs
D) Filtering
Question
Sending a packet to all network devices is called a ____ transmission.

A) unicast
B) multicast
C) broadcast
D) singlecast
Question
When using a single wireless gateway for SOHO or home use that has an internal firewall, it is always possible to set up the AP outside the protection of the firewall.
Question
A ____ is designed to prevent malicious packets from entering the network or computer.

A) firewall
B) switch
C) hub
D) repeater
Question
Limiting consists of placing a password on a system to keep unauthorized persons out.
Question
VLANs do not require that all of the devices be physically located together.
Question
A firewall is sometimes called a ____.

A) bridge
B) hub
C) packet filter
D) repeater
Question
____ keeps a record of the state of a connection between an internal computer and an external server and then makes decisions based on the connection as well as the rule base.

A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
Question
____ looks at the incoming packet and permits or denies it based strictly on the rule base.

A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
Question
The area that encompasses all of the network devices that can cause collisions is known as the ____.

A) collision domain
B) broadcast domain
C) unicast domain
D) multicast domain
Question
With ____, instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different port number.

A) CSMA/CA
B) NAT
C) PAT
D) CSMA/CD
Question
____ replaces the sender's actual IP address with another IP address.

A) CSMA/CA
B) NAT
C) CSMA/CD
D) HTTP
Question
Why is diversity necessary to provide better security?
Question
Why should information security system be as simple as possible?
Question
What are some of the advantages of using NAT?
Question
Briefly describe how to create wireless VLANs using switches.
Question
A network ____________________ is a subset of a larger network.
Question
____________________ are the air-handling spaces above drop ceilings used to circulate and otherwise handle air in a building.
Question
____ are designed to protect a device's network ports, or endpoints of communication.

A) Firewalls
B) Switches
C) Hubs
D) Repeaters
Question
How can you create network segments in a wired network?
Question
A(n) ____________________ is a logical grouping of network devices within a larger network.
Question
____ means that a single cable is used to support multiple virtual LANs.

A) Filtering
B) Broadcasting
C) Unicasting
D) Trunking
Question
What are the benefits of limiting access to information?
Question
In addition to a hardware firewall that protects the network, each wireless device should have its own software firewall installed, sometimes known as a(n) ____.

A) antivirus firewall
B) antispyware software
C) patch software
D) personal firewall
Question
Antivirus software definition files are also known as ____ files.

A) signature
B) infection
C) document
D) defense
Question
The Cisco Systems' ____ protocol is an alternative to IEEE 802.1q.

A) TPID
B) CRC
C) ISL
D) TCI
Question
The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.

A) CRC files
B) definition files
C) TPID files
D) infection files
Question
What are the benefits of layering security?
Question
A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.
Question
What is security by obscurity?
Question
The foundation of a firewall is a(n) ____________________.
Question
What are some of the features and tools provided by antispyware products?
Question
How does Microsoft classify patches?
Question
Match between columns
the best defense against viruses.
Segmentation
the best defense against viruses.
Patch software
the best defense against viruses.
Broadcast domain
the best defense against viruses.
Rule base
the best defense against viruses.
Rootkit
the best defense against viruses.
Browser Restore
the best defense against viruses.
Hardware firewalls
the best defense against viruses.
Antivirus software
the best defense against viruses.
Antispyware
area in which a broadcast occurs.
Segmentation
area in which a broadcast occurs.
Patch software
area in which a broadcast occurs.
Broadcast domain
area in which a broadcast occurs.
Rule base
area in which a broadcast occurs.
Rootkit
area in which a broadcast occurs.
Browser Restore
area in which a broadcast occurs.
Hardware firewalls
area in which a broadcast occurs.
Antivirus software
area in which a broadcast occurs.
Antispyware
usually located outside the network security perimeter as the first line of defense.
Segmentation
usually located outside the network security perimeter as the first line of defense.
Patch software
usually located outside the network security perimeter as the first line of defense.
Broadcast domain
usually located outside the network security perimeter as the first line of defense.
Rule base
usually located outside the network security perimeter as the first line of defense.
Rootkit
usually located outside the network security perimeter as the first line of defense.
Browser Restore
usually located outside the network security perimeter as the first line of defense.
Hardware firewalls
usually located outside the network security perimeter as the first line of defense.
Antivirus software
usually located outside the network security perimeter as the first line of defense.
Antispyware
software security updates that vendors provide for their application programs and operating systems.
Segmentation
software security updates that vendors provide for their application programs and operating systems.
Patch software
software security updates that vendors provide for their application programs and operating systems.
Broadcast domain
software security updates that vendors provide for their application programs and operating systems.
Rule base
software security updates that vendors provide for their application programs and operating systems.
Rootkit
software security updates that vendors provide for their application programs and operating systems.
Browser Restore
software security updates that vendors provide for their application programs and operating systems.
Hardware firewalls
software security updates that vendors provide for their application programs and operating systems.
Antivirus software
software security updates that vendors provide for their application programs and operating systems.
Antispyware
originally used to reduce the amount of traffic on a network.
Segmentation
originally used to reduce the amount of traffic on a network.
Patch software
originally used to reduce the amount of traffic on a network.
Broadcast domain
originally used to reduce the amount of traffic on a network.
Rule base
originally used to reduce the amount of traffic on a network.
Rootkit
originally used to reduce the amount of traffic on a network.
Browser Restore
originally used to reduce the amount of traffic on a network.
Hardware firewalls
originally used to reduce the amount of traffic on a network.
Antivirus software
originally used to reduce the amount of traffic on a network.
Antispyware
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Segmentation
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Patch software
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Broadcast domain
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Rule base
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Rootkit
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Browser Restore
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Hardware firewalls
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Antivirus software
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Antispyware
helps prevent computers from becoming infected by different types of spyware.
Segmentation
helps prevent computers from becoming infected by different types of spyware.
Patch software
helps prevent computers from becoming infected by different types of spyware.
Broadcast domain
helps prevent computers from becoming infected by different types of spyware.
Rule base
helps prevent computers from becoming infected by different types of spyware.
Rootkit
helps prevent computers from becoming infected by different types of spyware.
Browser Restore
helps prevent computers from becoming infected by different types of spyware.
Hardware firewalls
helps prevent computers from becoming infected by different types of spyware.
Antivirus software
helps prevent computers from becoming infected by different types of spyware.
Antispyware
allows the user to restore specific browser settings if spyware infects the Web browser.
Segmentation
allows the user to restore specific browser settings if spyware infects the Web browser.
Patch software
allows the user to restore specific browser settings if spyware infects the Web browser.
Broadcast domain
allows the user to restore specific browser settings if spyware infects the Web browser.
Rule base
allows the user to restore specific browser settings if spyware infects the Web browser.
Rootkit
allows the user to restore specific browser settings if spyware infects the Web browser.
Browser Restore
allows the user to restore specific browser settings if spyware infects the Web browser.
Hardware firewalls
allows the user to restore specific browser settings if spyware infects the Web browser.
Antivirus software
allows the user to restore specific browser settings if spyware infects the Web browser.
Antispyware
establishes what action the firewall should take when it receives a packet.
Segmentation
establishes what action the firewall should take when it receives a packet.
Patch software
establishes what action the firewall should take when it receives a packet.
Broadcast domain
establishes what action the firewall should take when it receives a packet.
Rule base
establishes what action the firewall should take when it receives a packet.
Rootkit
establishes what action the firewall should take when it receives a packet.
Browser Restore
establishes what action the firewall should take when it receives a packet.
Hardware firewalls
establishes what action the firewall should take when it receives a packet.
Antivirus software
establishes what action the firewall should take when it receives a packet.
Antispyware
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Designing a Secure Wireless Network
1
____ IP addresses are designed to be used only on a private internal network and cannot be used on the Internet.

A) Public
B) Routable
C) Routing
D) Private
D
2
____ are usually created by grouping together computers by Internet protocol (IP) addresses.

A) Segment domains
B) Collision domains
C) Subnets
D) Network segments
C
3
____ is used to create smaller segments for security purposes.

A) CSMA/CA
B) CSMA/CD
C) Ethernet
D) Segmentation
D
4
In a standard wired Ethernet network, all devices share the same media and a device can send a packet at any time rather than in a fixed or predictable fashion (known as ____ networking).

A) deterministic
B) sequential
C) polling
D) non-deterministic
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
One standard for marking VLAN packets is the IEEE ____ standard.

A) 802.1q
B) 802.1r
C) 802.1v
D) 802.1z
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Security by obscurity is sometimes criticized as being too weak.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
IEEE 802.11 WLANs have more collisions than wired Ethernet networks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
When a sending device on a LAN sends a packet that is intended for a single receiving device it is known as a ____ transmission.

A) multicast
B) unicast
C) broadcast
D) linecast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ is the practice of dividing the network into smaller units.

A) Switching
B) Segmentation
C) VLANs
D) Filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Sending a packet to all network devices is called a ____ transmission.

A) unicast
B) multicast
C) broadcast
D) singlecast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
When using a single wireless gateway for SOHO or home use that has an internal firewall, it is always possible to set up the AP outside the protection of the firewall.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ is designed to prevent malicious packets from entering the network or computer.

A) firewall
B) switch
C) hub
D) repeater
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Limiting consists of placing a password on a system to keep unauthorized persons out.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
VLANs do not require that all of the devices be physically located together.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A firewall is sometimes called a ____.

A) bridge
B) hub
C) packet filter
D) repeater
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____ keeps a record of the state of a connection between an internal computer and an external server and then makes decisions based on the connection as well as the rule base.

A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ looks at the incoming packet and permits or denies it based strictly on the rule base.

A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The area that encompasses all of the network devices that can cause collisions is known as the ____.

A) collision domain
B) broadcast domain
C) unicast domain
D) multicast domain
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
With ____, instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different port number.

A) CSMA/CA
B) NAT
C) PAT
D) CSMA/CD
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ replaces the sender's actual IP address with another IP address.

A) CSMA/CA
B) NAT
C) CSMA/CD
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Why is diversity necessary to provide better security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Why should information security system be as simple as possible?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
What are some of the advantages of using NAT?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Briefly describe how to create wireless VLANs using switches.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A network ____________________ is a subset of a larger network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ are the air-handling spaces above drop ceilings used to circulate and otherwise handle air in a building.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____ are designed to protect a device's network ports, or endpoints of communication.

A) Firewalls
B) Switches
C) Hubs
D) Repeaters
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
How can you create network segments in a wired network?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____________________ is a logical grouping of network devices within a larger network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____ means that a single cable is used to support multiple virtual LANs.

A) Filtering
B) Broadcasting
C) Unicasting
D) Trunking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
What are the benefits of limiting access to information?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
In addition to a hardware firewall that protects the network, each wireless device should have its own software firewall installed, sometimes known as a(n) ____.

A) antivirus firewall
B) antispyware software
C) patch software
D) personal firewall
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Antivirus software definition files are also known as ____ files.

A) signature
B) infection
C) document
D) defense
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
The Cisco Systems' ____ protocol is an alternative to IEEE 802.1q.

A) TPID
B) CRC
C) ISL
D) TCI
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.

A) CRC files
B) definition files
C) TPID files
D) infection files
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What are the benefits of layering security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What is security by obscurity?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The foundation of a firewall is a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are some of the features and tools provided by antispyware products?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
How does Microsoft classify patches?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
the best defense against viruses.
Segmentation
the best defense against viruses.
Patch software
the best defense against viruses.
Broadcast domain
the best defense against viruses.
Rule base
the best defense against viruses.
Rootkit
the best defense against viruses.
Browser Restore
the best defense against viruses.
Hardware firewalls
the best defense against viruses.
Antivirus software
the best defense against viruses.
Antispyware
area in which a broadcast occurs.
Segmentation
area in which a broadcast occurs.
Patch software
area in which a broadcast occurs.
Broadcast domain
area in which a broadcast occurs.
Rule base
area in which a broadcast occurs.
Rootkit
area in which a broadcast occurs.
Browser Restore
area in which a broadcast occurs.
Hardware firewalls
area in which a broadcast occurs.
Antivirus software
area in which a broadcast occurs.
Antispyware
usually located outside the network security perimeter as the first line of defense.
Segmentation
usually located outside the network security perimeter as the first line of defense.
Patch software
usually located outside the network security perimeter as the first line of defense.
Broadcast domain
usually located outside the network security perimeter as the first line of defense.
Rule base
usually located outside the network security perimeter as the first line of defense.
Rootkit
usually located outside the network security perimeter as the first line of defense.
Browser Restore
usually located outside the network security perimeter as the first line of defense.
Hardware firewalls
usually located outside the network security perimeter as the first line of defense.
Antivirus software
usually located outside the network security perimeter as the first line of defense.
Antispyware
software security updates that vendors provide for their application programs and operating systems.
Segmentation
software security updates that vendors provide for their application programs and operating systems.
Patch software
software security updates that vendors provide for their application programs and operating systems.
Broadcast domain
software security updates that vendors provide for their application programs and operating systems.
Rule base
software security updates that vendors provide for their application programs and operating systems.
Rootkit
software security updates that vendors provide for their application programs and operating systems.
Browser Restore
software security updates that vendors provide for their application programs and operating systems.
Hardware firewalls
software security updates that vendors provide for their application programs and operating systems.
Antivirus software
software security updates that vendors provide for their application programs and operating systems.
Antispyware
originally used to reduce the amount of traffic on a network.
Segmentation
originally used to reduce the amount of traffic on a network.
Patch software
originally used to reduce the amount of traffic on a network.
Broadcast domain
originally used to reduce the amount of traffic on a network.
Rule base
originally used to reduce the amount of traffic on a network.
Rootkit
originally used to reduce the amount of traffic on a network.
Browser Restore
originally used to reduce the amount of traffic on a network.
Hardware firewalls
originally used to reduce the amount of traffic on a network.
Antivirus software
originally used to reduce the amount of traffic on a network.
Antispyware
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Segmentation
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Patch software
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Broadcast domain
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Rule base
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Rootkit
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Browser Restore
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Hardware firewalls
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Antivirus software
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Antispyware
helps prevent computers from becoming infected by different types of spyware.
Segmentation
helps prevent computers from becoming infected by different types of spyware.
Patch software
helps prevent computers from becoming infected by different types of spyware.
Broadcast domain
helps prevent computers from becoming infected by different types of spyware.
Rule base
helps prevent computers from becoming infected by different types of spyware.
Rootkit
helps prevent computers from becoming infected by different types of spyware.
Browser Restore
helps prevent computers from becoming infected by different types of spyware.
Hardware firewalls
helps prevent computers from becoming infected by different types of spyware.
Antivirus software
helps prevent computers from becoming infected by different types of spyware.
Antispyware
allows the user to restore specific browser settings if spyware infects the Web browser.
Segmentation
allows the user to restore specific browser settings if spyware infects the Web browser.
Patch software
allows the user to restore specific browser settings if spyware infects the Web browser.
Broadcast domain
allows the user to restore specific browser settings if spyware infects the Web browser.
Rule base
allows the user to restore specific browser settings if spyware infects the Web browser.
Rootkit
allows the user to restore specific browser settings if spyware infects the Web browser.
Browser Restore
allows the user to restore specific browser settings if spyware infects the Web browser.
Hardware firewalls
allows the user to restore specific browser settings if spyware infects the Web browser.
Antivirus software
allows the user to restore specific browser settings if spyware infects the Web browser.
Antispyware
establishes what action the firewall should take when it receives a packet.
Segmentation
establishes what action the firewall should take when it receives a packet.
Patch software
establishes what action the firewall should take when it receives a packet.
Broadcast domain
establishes what action the firewall should take when it receives a packet.
Rule base
establishes what action the firewall should take when it receives a packet.
Rootkit
establishes what action the firewall should take when it receives a packet.
Browser Restore
establishes what action the firewall should take when it receives a packet.
Hardware firewalls
establishes what action the firewall should take when it receives a packet.
Antivirus software
establishes what action the firewall should take when it receives a packet.
Antispyware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.