Deck 9: Hacking Network Devices

Full screen (f)
exit full mode
Question
Networking devices allow the computers on a network to interact with each other.
Use Space or
up arrow
down arrow
to flip the card.
Question
A proxy server is hard to use since it is usually not included in router or firewall software.
Question
The user interacting via the proxy server is hidden, but can be traced through the log stored on the proxy server.
Question
Routers and switches both segment a network, and all can filter packets.
Question
Hackers can perform many attacks on routers and switches even if they cannot get into the building and set themselves up as a system administrator.
Question
A network can be divided into two main areas: networking software and networking ____.

A)agents
B)devices
C)programs
D)robots
Question
Networking software can be divided into three categories: security software, ____ software, and transport software.

A)presentation
B)routing
C)connection
D)linking
Question
The attacks made through proxy servers include buffer overflow attacks, denial-of-service attacks, and ____ attacks.

A)session-hijacking
B)password cracking
C)switch cracking
D)router hijacking
Question
____ are a form of logical network segmentation.

A)VPNs
B)VRNs
C)VEs
D)VLANs
Question
____ are often considered the ultimate one-point solution for securing networks from both internal and external threats.

A)VPNs
B)Routers
C)Firewalls
D)Switches
Question
The default password for Cisco routers is ____________________.
Question
In a(n) ____________________ attack, the hacker transmits a large quantity of packets to the router for it to determine an effective and efficient path for transfer.
Question
____________________ works like a DoS, but the attack comes from many IP addresses, so the defense is more complicated.
Question
To decide the quickest, most efficient path for a packet to reach its destination, a(n) ____________________ is maintained within a router.
Question
The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious code from entering a network.
Question
What are some of the functions performed by proxy servers?
Question
Why should you configure different admin passwords for all your routers and switches?
Question
What are the categories of firewall attacks?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Hacking Network Devices
1
Networking devices allow the computers on a network to interact with each other.
True
2
A proxy server is hard to use since it is usually not included in router or firewall software.
False
3
The user interacting via the proxy server is hidden, but can be traced through the log stored on the proxy server.
True
4
Routers and switches both segment a network, and all can filter packets.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Hackers can perform many attacks on routers and switches even if they cannot get into the building and set themselves up as a system administrator.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
A network can be divided into two main areas: networking software and networking ____.

A)agents
B)devices
C)programs
D)robots
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
Networking software can be divided into three categories: security software, ____ software, and transport software.

A)presentation
B)routing
C)connection
D)linking
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
The attacks made through proxy servers include buffer overflow attacks, denial-of-service attacks, and ____ attacks.

A)session-hijacking
B)password cracking
C)switch cracking
D)router hijacking
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
____ are a form of logical network segmentation.

A)VPNs
B)VRNs
C)VEs
D)VLANs
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
____ are often considered the ultimate one-point solution for securing networks from both internal and external threats.

A)VPNs
B)Routers
C)Firewalls
D)Switches
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
The default password for Cisco routers is ____________________.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
In a(n) ____________________ attack, the hacker transmits a large quantity of packets to the router for it to determine an effective and efficient path for transfer.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
____________________ works like a DoS, but the attack comes from many IP addresses, so the defense is more complicated.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
To decide the quickest, most efficient path for a packet to reach its destination, a(n) ____________________ is maintained within a router.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious code from entering a network.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
What are some of the functions performed by proxy servers?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Why should you configure different admin passwords for all your routers and switches?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
What are the categories of firewall attacks?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.