Deck 4: Secure Networks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/81
Play
Full screen (f)
Deck 4: Secure Networks
1
Which of the following is NOT one of the four goals to consider when creating a secure networking environment?
A) Confidentiality
B) Integrity
C) Functionality
D) Cost
A) Confidentiality
B) Integrity
C) Functionality
D) Cost
Cost
2
________ refer to ways of attacking networks.
A) Attack vectors
B) Tethering
C) DoS attacks
D) Indirect attacks
A) Attack vectors
B) Tethering
C) DoS attacks
D) Indirect attacks
Attack vectors
3
The castle model describes when ________.
A) network administrators restrict access to those on the outside of the business and limit access on the inside
B) the good guys are on the inside and the attackers are on the outside
C) network administrators restrict access to only those that should have access within the company
D) computer software restricts access on the inside to the top management and limits access to lower levels in the company
A) network administrators restrict access to those on the outside of the business and limit access on the inside
B) the good guys are on the inside and the attackers are on the outside
C) network administrators restrict access to only those that should have access within the company
D) computer software restricts access on the inside to the top management and limits access to lower levels in the company
the good guys are on the inside and the attackers are on the outside
4
________ describes the idea that creating a 100 percent secure network is not possible.
A) The castle model
B) The death of the perimeter
C) The city model
D) Attack vectors
A) The castle model
B) The death of the perimeter
C) The city model
D) Attack vectors
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
5
IDS refers to ________.
A) internal intrusion detection
B) internal interruption detection
C) instantaneous intrusion determination
D) industry intrusion detection
A) internal intrusion detection
B) internal interruption detection
C) instantaneous intrusion determination
D) industry intrusion detection
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
6
Functionality and access control are two of the four goals to consider when securing networks.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
7
DoS attacks are one of the least common types of network attacks against corporations.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
8
In the castle model of network defense, there was a well-guarded single point of entry.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
9
The "death of the perimeter"
model has no distinct perimeter and there are multiple ways of entering the network.
model has no distinct perimeter and there are multiple ways of entering the network.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
10
When a "bad guy"
ends up being an employee, "death of the perimeter"
is confirmed.
ends up being an employee, "death of the perimeter"
is confirmed.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
11
________ attempts to make a server or network unavailable to legitimate users.
A) DoS attack
B) The castle model
C) The death of the perimeter
D) The city model
A) DoS attack
B) The castle model
C) The death of the perimeter
D) The city model
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
12
The ultimate goal of a DoS attack is ________.
A) to cause harm
B) financial gain
C) to disrupt business activities
D) to access a business' inventory
A) to cause harm
B) financial gain
C) to disrupt business activities
D) to access a business' inventory
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
13
A common occurrence with news aggregators like Slashdot or The Huffington Post is ________.
A) referrals from large sites
B) degrading services
C) stopping critical services
D) faulty coding
A) referrals from large sites
B) degrading services
C) stopping critical services
D) faulty coding
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is NOT one of the main DoS attack methods?
A) Direct/indirect
B) Intermediary
C) Reflected
D) Degrade services
A) Direct/indirect
B) Intermediary
C) Reflected
D) Degrade services
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is the simplest form of a DoS attack?
A) Direct/indirect
B) Intermediary
C) Reflected
D) Sending malformed packets
A) Direct/indirect
B) Intermediary
C) Reflected
D) Sending malformed packets
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
16
A DoS attack begins when a ________ sends a signal for the bots to attack a victim.
A) botmaster
B) bot
C) DDoS
D) DoS
A) botmaster
B) bot
C) DDoS
D) DoS
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is the second primary DoS method used by attackers?
A) Direct/indirect
B) Intermediary
C) Reflected
D) Sending malformed packets
A) Direct/indirect
B) Intermediary
C) Reflected
D) Sending malformed packets
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
18
________ is the process of hiding an attacker's source IP address.
A) IP flooding
B) Backscattering
C) DDoSs
D) Spoofing
A) IP flooding
B) Backscattering
C) DDoSs
D) Spoofing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following occurs when an attacker sends numerous TCP SYN segments to a victim server?
A) SYN flood
B) Ping flood
C) Backscatter
D) HTTP flood
A) SYN flood
B) Ping flood
C) Backscatter
D) HTTP flood
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
20
A side effect of an attacker spoofing an IP address is ________.
A) SYN flood
B) ping flood
C) backscatter
D) spoofing
A) SYN flood
B) ping flood
C) backscatter
D) spoofing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
21
A ________ is similar to a P2P redirect.
A) SYN flood
B) reflected attack
C) Smurf flood
D) DDoS
A) SYN flood
B) reflected attack
C) Smurf flood
D) DDoS
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
22
DoS attacks occur on a weekly basis, not usually daily.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
23
The most common service targeted by attackers is HTTP.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
24
DoS attacks can cause harm by stopping a critical service.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
25
DoS attacks can cause harm by slowly degrading services over time.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
26
Typically DoS attacks against critical services are difficult to identify and last for a long time.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
27
Intermediaries are typically referred to as bots.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
28
Rate limiting can be used to reduce a certain type of traffic to a reasonable amount.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
29
Black-holing an attacker is a poor long-term strategy because attackers can quickly change source IP addresses.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is a network attack that manipulates host ARP tables to reroute LAN traffic?
A) SYN flood
B) Ping flood
C) ARP poisoning
D) HTTP flood
A) SYN flood
B) Ping flood
C) ARP poisoning
D) HTTP flood
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
31
________ uses false ARP replies to map any IP address to any MAC address.
A) An ARP reply
B) An ARP request
C) ARP poisoning
D) ARP spoofing
A) An ARP reply
B) An ARP request
C) ARP poisoning
D) ARP spoofing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
32
A gateway records all internal IP addresses in its ________.
A) ARP table
B) ARP reply
C) ARP request
D) static table
A) ARP table
B) ARP reply
C) ARP request
D) static table
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
33
ARP poisoning can be prevented by using ________.
A) static IP and ARP tables
B) ARP requests and ARP replies
C) dynamic IP and ARP tables
D) ARP spoofing
A) static IP and ARP tables
B) ARP requests and ARP replies
C) dynamic IP and ARP tables
D) ARP spoofing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
34
A difficulty in using static IP and ARP tables is that organizations change.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) ________ sits in his or her car outside of the walls of a company in order to access a system.
A) EAP
B) packet sniffer
C) drive-by hacker
D) botmaster
A) EAP
B) packet sniffer
C) drive-by hacker
D) botmaster
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
36
Most wireless communication in LANs is used to link wireless clients to a firm's wired Ethernet network.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
37
Wireless LANs are not possible.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
38
Wireless traffic often is encrypted in ways that are quite difficult to crack.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
39
The ________ standard provides access control to prevent illegitimate clients from associating with a network.
A) 802.1X
B) RADIUS
C) 802.11
D) IEEE 802.11
A) 802.1X
B) RADIUS
C) 802.11
D) IEEE 802.11
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
40
The name of the 802.1X standard is ________.
A) IEEE 802.11
B) Port-based Access Control
C) Extensible Authentication Protocol
D) RADIUS
A) IEEE 802.11
B) Port-based Access Control
C) Extensible Authentication Protocol
D) RADIUS
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
41
In an 802.1X standard, when a computer first connects, the port is in a(n) ________ state.
A) authorized
B) unauthorized
C) static
D) confidential
A) authorized
B) unauthorized
C) static
D) confidential
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
42
In an 802.1X standard, a ________is the primary point of control.
A) switch port
B) wireless connection
C) static table
D) PEAP
A) switch port
B) wireless connection
C) static table
D) PEAP
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is NOT an advantage in using a central authentication server instead of each workgroup switch to do all the work?
A) Cost savings
B) Immediate changes
C) Integrity
D) Consistency
A) Cost savings
B) Immediate changes
C) Integrity
D) Consistency
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
44
In 802.1X, a computer seeking access is the ________.
A) supplicant
B) intermediary
C) botmaster
D) authenticator
A) supplicant
B) intermediary
C) botmaster
D) authenticator
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
45
802.1X calls the workgroup switch the ________.
A) pass-through operation
B) RADIUS server
C) EAP
D) authenticator
A) pass-through operation
B) RADIUS server
C) EAP
D) authenticator
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
46
________ governs the specifics of authentication interactions.
A) The central authentication server
B) EAP
C) Pass-through operations
D) A RADIUS server
A) The central authentication server
B) EAP
C) Pass-through operations
D) A RADIUS server
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
47
An ________ passes a message through.
A) authentication switch
B) Ethernet switch
C) EAP
D) authenticator
A) authentication switch
B) Ethernet switch
C) EAP
D) authenticator
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
48
RADIUS is a(n) ________ protocol.
A) Extensible Authentication
B) client/server
C) VPN
D) Address Resolution
A) Extensible Authentication
B) client/server
C) VPN
D) Address Resolution
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
49
The RADIUS protocol provides ________.
A) authentication and integrity
B) authentication and authorization
C) authenticity and functionality
D) confidentiality and access control
A) authentication and integrity
B) authentication and authorization
C) authenticity and functionality
D) confidentiality and access control
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
50
802.1X is quite challenging to implement in wired LANs.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
51
Using a central authentication server brings consistency in authentication.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
52
Ethernet switches can sense when a host connects to one of its ports.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
53
RADIUS provides auditing of connections.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is NOT accurate about wireless networks over wired networks?
A) Wireless are quicker.
B) Wireless are easier.
C) Wireless are less expensive.
D) Wireless are rare to find.
A) Wireless are quicker.
B) Wireless are easier.
C) Wireless are less expensive.
D) Wireless are rare to find.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
55
Wireless attacks focus on the ________.
A) evil twin access point
B) switch port
C) access point
D) MAC access control point
A) evil twin access point
B) switch port
C) access point
D) MAC access control point
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
56
Connecting to a network without permission is known as ________.
A) secure access
B) unauthorized access
C) a client/server attack
D) rogue access
A) secure access
B) unauthorized access
C) a client/server attack
D) rogue access
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is FALSE about open wireless networks?
A) They are often posted for the public to know about.
B) They can be legally accessed by anyone.
C) They are typically found in public places like coffee shops.
D) They are legally accessed only by staff of the company or owned network.
A) They are often posted for the public to know about.
B) They can be legally accessed by anyone.
C) They are typically found in public places like coffee shops.
D) They are legally accessed only by staff of the company or owned network.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
58
A(n) ________ can be used to gather user data.
A) static IP table
B) ARP tables
C) RTS frame
D) packet sniffer
A) static IP table
B) ARP tables
C) RTS frame
D) packet sniffer
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
59
What is RFMON?
A) Radio frequency monitoring
B) Radio frequency mode
C) Request frequency monitoring
D) Radio frame monitoring
A) Radio frequency monitoring
B) Radio frequency mode
C) Request frequency monitoring
D) Radio frame monitoring
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
60
________ is when attackers focus electronic attacks on specific high-value targets.
A) ARP poisoning
B) Whaling
C) Radio frequency monitoring
D) Rate limiting
A) ARP poisoning
B) Whaling
C) Radio frequency monitoring
D) Rate limiting
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
61
A(n) ________ is a personal computer that has software to allow the computer to masquerade as an access point.
A) switch port
B) access point
C) MAC access control point
D) evil twin access point
A) switch port
B) access point
C) MAC access control point
D) evil twin access point
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
62
________ transmit on 2.4-GHz and/or 5-GHz frequency bands.
A) Ethernet networks
B) ARP requests and ARP replies
C) Wireless 802.11 networks
D) Wired 802.11 networks
A) Ethernet networks
B) ARP requests and ARP replies
C) Wireless 802.11 networks
D) Wired 802.11 networks
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
63
________ is also known as radio frequency interference.
A) Electromagnetic interference
B) Noise
C) Whaling
D) An evil twin access point
A) Electromagnetic interference
B) Noise
C) Whaling
D) An evil twin access point
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following record all signals, including packet transmissions, within a radio frequency band?
A) Ethernet networks
B) ARP requests and ARP replies
C) Spectrum analyzers
D) EMIs
A) Ethernet networks
B) ARP requests and ARP replies
C) Spectrum analyzers
D) EMIs
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
65
________ tell wireless clients that you want to transmit for a given amount of time.
A) CTS frames
B) RTS frames
C) Packet injections
D) Deauthenticate messages
A) CTS frames
B) RTS frames
C) Packet injections
D) Deauthenticate messages
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
66
________ tell wireless clients that you have received an RTS frame and that they should not transmit until the designated time expires.
A) CTS frames
B) ARP replies
C) Packet injections
D) Deauthenticate messages
A) CTS frames
B) ARP replies
C) Packet injections
D) Deauthenticate messages
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
67
________ assumes that the connection between supplicant and authenticator is secure. Additional security is needed between the supplicant and the access point in 802.11 WLANs.
A) EAP
B) PEAP
C) WEP
D) WPA
A) EAP
B) PEAP
C) WEP
D) WPA
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
68
What does the first "P" in PEAP stand for?
A) Priority
B) Protected
C) Packet
D) Prioritized
A) Priority
B) Protected
C) Packet
D) Prioritized
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
69
________ is a standard created by the Wi-Fi Alliance by taking an early draft of the 802.11i standard.
A) WEP
B) WPA
C) WLAN
D) WPA2
A) WEP
B) WPA
C) WLAN
D) WPA2
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following was released in 2018?
A) WPA3
B) WPA
C) WEP
D) WPA2
A) WPA3
B) WPA
C) WEP
D) WPA2
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following was released in 2018?
A) WPA3
B) WPA
C) WEP
D) WPA2
A) WPA3
B) WPA
C) WEP
D) WPA2
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
72
In 802.11i or WPA in PSK/personal mode, passphrases must be at least ________.
A) 20 characters long
B) 56 characters long
C) 256 characters long
D) 512 characters long
A) 20 characters long
B) 56 characters long
C) 256 characters long
D) 512 characters long
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
73
To work with an access point, a station must know the access point's ________.
A) MAC address
B) SSID
C) WPA
D) WEP
A) MAC address
B) SSID
C) WPA
D) WEP
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
74
Ethernet LANs are the only type of networks that require security.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
75
Wireless LANs have fewer security issues to consider than do wired LANs.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
76
An open network can be legally accessed by anyone.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
77
Promiscuous mode allows an attacker to receive messages addressed to other users.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
78
Evil twin access point attacks are less commonly found in public hot spots.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
79
Interference damages an 802.11 signal and makes packets unreadable.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
80
PSK/personal mode was created for individual users in a larger corporation.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck