logo image

Network + 7- 9

A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?
SIEM system?
?Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
?Natas
?If multiple honeypots are connected to form a larger network, what term is used to describe the network?
?honeynet
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below??
?phishing
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
?man-in-the-middle attack
?Which option below is a standard created by the NSA that defines protections against radio frequency emanations?
?TEMPEST
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it’s just part of the wire??
?virtual wire mode
At what layer of the OSI model do firewalls operate??
Network
?What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?
?polymorphism
Botnets often make use of what chat protocol in order to receive commands??
?IRC
Which software below serves as the firewall for Linux systems??
?iptables
Which software below combines known scanning techniques and exploits to allow for hybrid exploits??
?metasploit
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date??
logic bomb?
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it’s just part of the wire??
?virtual wire mode
In ACL statements, the “any” keyword is equivalent to using what wildcard mask below?
0.0.0.0
?A reflective attack can be increased in intensity by combining it with what type of attack?
amplification attack
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below??
banner-grabbing attack
Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below??
worms
A proxy that provides Internet clients access to services on its own network is known as what type of proxy??
reverse proxy
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites??
VPN gateway
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??
TKIP
?A SecurID key chain fob from RSA security generates a password that changes how often?
every 60 seconds
What authentication protocol sends authentication information in cleartext without encryption??
PAP
The combination of a public key and a private key are known by what term below?
Key pair
How often should administrators and network users be required to change their password?
60 days
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??
TKIP
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers??
IaaS?
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
?SaaS
When using public and private keys to connect to an SSH server, where must your public key be placed??
?In the authorized keys file on the host where the SSH server is.
When using public and private keys to connect to an SSH server, where must your public key be placed??
In the authorized keys file on the host where the SSH server is.
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length??
160 bit
At what layer of the OSI model does the IPSec encryption protocol operate??
Network Layer
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??
TKIP
The SSH service listens on what TCP port?
22
How often should administrators and network users be required to change their password?
60 days
What authentication protocol sends authentication information in cleartext without encryption??
PAP
At what layer of the OSI model does the IPSec encryption protocol operate??
?Network layer
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites??
VPN gateway
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??
TKIP
What protocol below is a Microsoft proprietary protocol first available in Windows Vista??
SSTP
?The combination of a public key and a private key are known by what term below?
?key pair
?The SSH service listens on what TCP port?
?22
What authentication protocol sends authentication information in cleartext without encryption??
PAP
Digital certificates are issued by organizations known as what term??
certification authorities
At what layer of the OSI model does the IPSec encryption protocol operate??
?Network layer
When using public and private keys to connect to an SSH server, where must your public key be placed??
?In the authorized keys file on the host where the SSH server is.
?What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
?IPSec
?The combination of a public key and a private key are known by what term below?
key pair
Digital certificates are issued by organizations known as what term??
?certification authorities
What authentication protocol sends authentication information in cleartext without encryption??
?PAP
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
IPSec
Digital certificates are issued by organizations known as what term??
certification authorities
What security principle provides proof of delivery and proof of the sender’s identity??
non-repudiation
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
EAP
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments??
Citrix Xen
What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?
MPLS
Which of the following is not a requirement in order to use a softphone??
A wireless carrier to handle the voice path.
Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?
H.323 gateway
When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones??
user agent client
SNMP agents receive requests from an NMS on what port number??
161
What component of SIP is a server that responds to user agent clients’ requests for session initiation and termination?
user agent server
A highly available server is available what percentage of the time??
99.99%
A server running the SIP protocol listens on what TCP/UDP port for unsecured communications??
5060
What percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018??
79%
In H.323, which protocol below handles call or videoconference signaling?
H.225
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below??
Jabber
When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones??
user agent client
The Priority Code Point field in a frame consists of how many bits??
3 bits
What component of SIP is a server that responds to user agent clients’ requests for session initiation and termination?
user agent server
Packets that exceed the medium’s maximum packet size are known by what term??
giants
?On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?
SS7
A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?
5060
SNMP agents receive requests from an NMS on what port number??
?161
Packets that are smaller than a medium’s minimum packet size are known by what term below?
runts
What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls??
PCI DSS
?In a VoIP call, what method of transmission is used between two IP phones?
unicast
In order for gateways to exchange and translate signaling and control information with each other so that voice and video packets are properly routed through a network, what intermediate device is needed??
media gateway controller
A computer that provides support for multiple H.323 terminals and manages communication between them is known as what term below?
MCU
Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers??
honeypots

lure

What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
SLIP

PPP

A _________________ is a service that is shared between multiple organizations, but not available publicly.?
Community Cloud
The key management phase of IPSec is reliant on which two services below?
Internet Key Exchange (IKE)

?Internet Security Association and Key Management Protocol (ISAKMP)

What feature on some network switches can be used to detect faked arp messages?
?dynamic ARP inspection
CALEA requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
True
What two different types of encryption can be used by IPSec during data transfer??
Authentication Header (AH)

?Encapsulating Security Payload (ESP)

Different types of organizations have similar levels of network security risks.
False
What protocol below is a Microsoft proprietary protocol first available in Windows Vista??
SSTP
Networks that use ________________, such as T-1 or DSL connections to the Internet, are vulnerable to eavesdropping at a building’ s demarc (demarcation point), at a remote switching facility, or in a central office.
leased public lines
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers??
laaS
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
True
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP
False
What option below is not an encryption algorithm method that is used by SSH?
SHA-2
A SOHO wireless router typically acts as a firewall and may include packet filtering options
True
What two terms below describe the process of manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment??
traffic shaping?

?packet shaping

What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners’ knowledge or consent??
botnet

?zombie army

?What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
IPSec
What two options below are AAA services??
RADIUS
TACACS+
The simplest type of firewall is a content filtering firewall.?
False
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.?
False
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
True
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
True
What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network??
NOT SYN attck
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field??
NOT encription
?What two terms below are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals?
NOT
NOT
NOT

Digital PBX
ATA PBX

Need essay sample on "Network + 7- 9"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy