tcp/ip chapters 9-11 review
DESCRIPTION
TCP/IP Chapters 9-11 ReviewTRANSCRIPT
Question 10.34 out of 0.34 points
A(n) ____ documents a vulnerability (i.e., a weakness), usually in the context of a recipe, or by including software tools used to mount an attack.Answer
Selected Answer:
d.
exploit
Correct Answer:
d.
exploit
Question 20.34 out of 0.34 points
A(n) ____ refers to a successful attempt to compromise a system’s security.Answer
Selected Answer:
d.
break-in
Correct Answer:
d.
break-in
Question 30.34 out of 0.34 points
Trying every likely or possible password for an account is called a(n) ____.Answer
Selected Answer:
a.
brute force attack
Correct Answer:
a.
brute force attack
Question 40.34 out of 0.34 points
An attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while it’s in transit is called ____.
Answer
Selected Answer:
b.
packet sniffing
Correct Answer:
b.
packet sniffing
Question 50.34 out of 0.34 points
In a(n) ____ attack, a service is inundated with service requests, or malformed service requests cause a server to hang.Answer
Selected Answer:
c.
DoS
Correct Answer:
c.
DoS
Question 60.34 out of 0.34 points
In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side.Answer
Selected Answer:
b.
Man-in-the middle
Correct Answer:
b.
Man-in-the middle
Question 70.34 out of 0.34 points
A ____ is a weak spot or known place of attack on any common operating system, application, or service.Answer
Selected Answer:
a.
hole
Correct a.
Answer: hole
Question 80.34 out of 0.34 points
A ____ is an undocumented and illicit point of entry into an operating system or application added by a system’s programmers to bypass normal security.Answer
Selected Answer:
c.
back door
Correct Answer:
c.
back door
Question 90.34 out of 0.34 points
A(n) ____ is a kind of virus that is self-replicating.Answer
Selected Answer:
a.
worm
Correct Answer:
a.
worm
Question 100.34 out of 0.34 points
____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature.Answer
Selected Answer:
a.
Adware
Correct Answer:
a.
Adware
Question 110.34 out of 0.34 points
____ is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer.Answer
Selected Answer:
a.
Spyware
Correct Answer:
a.
Spyware
Question 120.34 out of 0.34 points
____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities.Answer
Selected Answer:
d.
Spoofing
Correct Answer:
d.
Spoofing
Question 130.34 out of 0.34 points
The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system.Answer
Selected Answer:
d.
session hijacking
Correct Answer:
d.
session hijacking
Question 140.34 out of 0.34 points
____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information.Answer
Selected Answer:
b.
Access control
Correct Answer:
b.
Access control
Question 150.34 out of 0.34 points
____ is the ability to verify that the data received did in fact come from the named source.Answer
Selected Answer:
c.
Data origin authentication
Correct Answer:
c.
Data origin authentication
Question 160.34 out of 0.34 points
A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks.Answer
Selected Answer:
c.
bastion host
Correct Answer:
c.
bastion host
Question 170.34 out of 0.34 points
A ____ is an area that’s accessible to both outsiders and insiders, but which establishes a buffer area between what’s completely inside and outside a network boundary.Answer
Selected Answer:
a.
DMZ
Correct a.
Answer: DMZ
Question 180.34 out of 0.34 points
A ____ is a specially, “hardened” software service, or a software/hardware product, that erects a barrier to inspect and control traffic flow between networks.Answer
Selected Answer:
a.
firewall
Correct Answer:
a.
firewall
Question 190.34 out of 0.34 points
A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses.Answer
Selected Answer:
d.
port scanner
Correct Answer:
d.
port scanner
Question 200.34 out of 0.34 points
____ focuses on documenting network and system configuration data, and monitoring the effects of the use of various versions of hardware and software on network behavior, reliability, and performance.Answer
Selected Answer:
a.
Configuration management
Correct Answer:
a.
Configuration management
Question 210.34 out of 0.34 points
____ focuses on detecting, logging, and repairing network and system problems (whenever possible) to keep a network operating properly.Answer
Selected Answer:
a.
Fault management
Correct Answer:
a.
Fault management
Question 220.34 out of 0.34 points
____ focuses on controlling access to network resources to avoid denials of service and unwanted access or incursions into network resources, and restrict access to resources solely on the basis of proper authentication and authorization.Answer
Selected Answer:
a.
Security management
Correct Answer:
a.
Security management
Question 230.34 out of 0.34 points
A(n) ____ management solution supports communications between management agents and the manager device, regardless of the status of the data network.Answer
Selected Answer:
d.
out-of-band
Correct Answer:
d.
out-of-band
Question 240.34 out of 0.34 points
____ uses plain text passwords, called community names, or strings, passed between the SNMP client and manager to validate the authenticity of the data and/or the requestor of the data.Answer
Selected Answer:
a.
SNMPv1
Correct Answer:
a.
SNMPv1
Question 250.34 out of 0.34 points
A(n) ____ is a database of manageable objects for a device.Answer
Selected Answer:
c.
Management Information Base
Correct Answer:
c.
Management Information Base
Question 260.34 out of 0.34 points
The ____ MIB is used to monitor and administer remote segments of a distributed network.Answer
Selected Answer:
c.
Remote Monitoring
Correct Answer:
c.
Remote Monitoring
Question 270.34 out of 0.34 points
RMON places agents, called ____ at various locations on the distributed network.Answer
Selected Answer:
b.
network probes
Correct Answer:
b.
network probes
Question 28
0.34 out of 0.34 points
Distributed networks usually evolve over time and become ____.Answer
Selected Answer:
a.
heterogeneous environments
Correct Answer:
a.
heterogeneous environments
Question 290.34 out of 0.34 points
The ____ command is used to read a single entry within a MIB.Answer
Selected Answer:
a.
GET-REQUEST
Correct Answer:
a.
GET-REQUEST
Question 300.34 out of 0.34 points
When an SNMP manager wants to read a series of entries in a MIB table, it uses the ____ command.Answer
Selected Answer:
c.
GET-NEXT
Correct Answer:
c.
GET-NEXT
Question 310.34 out of 0.34 points
The ____ command is the “active controller” for SNMP capabilities and reporting on managed devices.Answer
Selected Answer:
b.
SET
Correct Answer:
b.
SET
Question 320.34 out of 0.34 points
____ messages are sent gratuitously by the SNMP agent to the SNMP manager when an event setting or “trigger” is exceeded.Answer
Selected Answer:
b.
TRAP
Correct Answer:
b.
TRAP
Question 330.34 out of 0.34 points
The ____ community name is used to access the MIB and read the object values.Answer
Selected Answer:
b.
Read-Only
Correct Answer:
b.
Read-Only
Question 340.34 out of 0.34 points
The ____ community name is used to change the contents of the MIB.Answer
Selected Answer:
a.
Read/Write
Correct Answer:
a.
Read/Write
Question 350.34 out of 0.34 points
The ____ community name is used to access the trap settings on an SNMP manager.Answer
Selected Answer:
c.
Alert
Correct Answer:
c.
Alert
Question 360.34 out of 0.34 points
In practice, most SNMP consoles are part of a software package commonly called a(n) “____.”Answer
Selected Answer:
c.
framework
Correct Answer:
c.
framework
Question 370.34 out of 0.34 points
SNMP is a request/response-based protocol used to transport management messages between a(n) ____ and an SNMP manager.Answer
Selected Answer:
d.
SNMP agent
Correct Answer:
d.
SNMP agent
Question 380.34 out of 0.34 points
____ offers the Engineer’s Edition Toolset, a popular suite of SNMP utilities that includes MIB browsers and sweepers.Answer
Selected Answer:
a.
SolarWinds.net
Correct Answer:
a.
SolarWinds.net
Question 390.34 out of 0.34 points
The first Microsoft operating system to use DNS is Windows ____.Answer
Correct Answer:
a.
2000
Correct Answer:
a.
2000
Question 400.34 out of 0.34 points
The preferred form of networking in an all-Windows 2000 and/or Windows XP environment is direct hosting of the (SMB) protocol, with ____ as the domain controller, and DNS for name resolution.Answer
Selected Answer:
a.
Active Directory
Correct Answer:
a.
Active Directory
Question 410.34 out of 0.34 points
The Windows 2000 and Windows XP operating systems use a NetBIOS ____ to permit applications, such as SMB and Lotus Notes, to make NetBIOS calls and translate those calls into commands sent to the Windows 2000 and Windows XP TDI.Answer
Selected Answer:
c.
emulator
Correct Answer:
c.
emulator
Question 420.34 out of 0.34 points
The ____ driver(s) presents the transport protocols with a common set of entry points for the network adapter(s) installed on the computer.
Answer
Selected Answer:
d.
Network Driver Interface Specification
Correct Answer:
d.
Network Driver Interface Specification
Question 430.34 out of 0.34 points
____ are used for connectionless “announcement” type traffic, or for request and response traffic that does not require the establishment and maintenance of a reliable connection between two hosts.Answer
Selected Answer:
c.
Datagrams
Correct Answer:
c.
Datagrams
Question 440.34 out of 0.34 points
____ is a connectionless protocol.Answer
Selected Answer:
d.
UDP
Correct Answer:
d.
UDP
Question 450.34 out of 0.34 points
____ creates and maintains a reliable connection more consistent with NetBIOS session needs.Answer
Selected Answer:
b.
TCP
Correct Answer:
b.
TC
P
Question 460.34 out of 0.34 points
NetBIOS names are based on the user name during ____ and the information configured for the specific computer in the Network applet in Control Panel.Answer
Correct Answer:
b.
logon
Correct Answer:
b.
logon
Question 470.34 out of 0.34 points
NetBIOS ____ names resolve to a single address.Answer
Selected Answer:
a.
unique
Correct Answer:
a.
unique
Question 480.34 out of 0.34 points
NetBIOS names are ____ characters in length and are divided into two parts.Answer
Selected Answer:
c.
16
Correct Answer:
c.
16
Question 490.34 out of 0.34 points
A(n) ____ registers and resolves names by using only broadcasts.Answer
Selected Answer:
c.
b-
node
Correct Answer:
c.
b-node
Question 500.34 out of 0.34 points
A(n) ____ attempts to register and resolve names using the local WINS server.Answer
Selected Answer:
b.
p-node
Correct Answer:
b.
p-node
Question 510.34 out of 0.34 points
When a(n) ____ computer or process shuts down gracefully, it sends a Name Release Request packet to the WINS server to indicate that it is no longer using the name, thus releasing the name.Answer
Selected Answer:
c.
p-node
Correct Answer:
c.
p-node
Question 520.34 out of 0.34 points
____ methods are used only when broadcast methods fail.Answer
Selected Answer:
d.
P-node
Correct Answer:
d.
P-node
Question 530.34 out of 0.34 points
The ____ is a hybrid that uses the p-node method as its first choice.Answer
Selected Answer:
b.
h-node
Correct Answer:
b.
h-node
Question 540.34 out of 0.34 points
____ is a server service, running under Windows NT Server,Windows 2000 Server, or Windows Server 2003.Answer
Selected Answer:
c.
WINS
Correct Answer:
c.
WINS
Question 550.34 out of 0.34 points
The ____ command-line tool in Windows Server 2003 is helpful for WINS servers over WAN links to better manage slower network connections.Answer
Selected Answer:
b.
Netsh
Correct Answer:
b.
Netsh
Question 560.34 out of 0.34 points
M/S DNS servers in the ____ domain provide reverse lookup, returning the name(s) associated with a particular IP address.Answer
Selected Answer:
d.
in-addr.arp
a
Correct Answer:
d.
in-addr.arpa
Question 570.34 out of 0.34 points
Which of the following is not true concerning differences between IPv4 and IPv6?Answer
Selected Answer:
b.
IPv4 uses both TCP and UDP for transport whereas IPv6 only uses TCP.
Correct Answer:
b.
IPv4 uses both TCP and UDP for transport whereas IPv6 only uses TCP.
Question 580.34 out of 0.34 points
Multicast addresses in IPv6 use a four-bit ____, which is a four-bit field that limits the valid range for a multicast address to define the portion of the Internet over which the multicast group is valid.Answer
Selected Answer:
d.
scope identifier
Correct Answer:
d.
scope identifier
Question 590.34 out of 0.34 points
Nodes that need to tunnel IPv6 packets through IPv4 routers use the IPv4-compatible addresses. These are called dual ____.Answer
Selected Answer:
d.
stack nodes
Correct Answer:
d.
stack nodes
Question 600.34 out of 0.34 points
____ is the name of a special IP address that allows a host on a network to check the operation of its own local TCP/IP protocol stack.Answer
Selected Answer:
b.
Loopback
Correct Answer:
b.
Loopback
Question 610.34 out of 0.34 points
____ must announce that they wish to receive multicast traffic bound for a particular multicast address.Answer
Correct Answer:
c.
Nodes
Correct Answer:
c.
Nodes
Question 620.34 out of 0.34 points
A special type of multicast address called the ____ address is used to support Neighbor Solicitation (NS).Answer
Selected Answer:
b.
solicited node
Correct Answer:
b.
solicited node
Question 630.34 out of 0.34 points
IPv6 ____ protocol, specified in RFC 2461, defines mechanisms whereby nodes can find out on what link they are located, learn their subnet prefix, where the link’s working routers reside, who their neighbors are, which of them is active, and in all cases, to associate a
link layer address (such as an Ethernet MAC address) with an IPv6 address.Answer
Selected Answer:
b.
Neighbor Discovery
Correct Answer:
b.
Neighbor Discovery
Question 640.34 out of 0.34 points
A node can send a ____ to find (or verify) the link layer address of a local node, see if that node is still available, or check that its own address is not in use by another node.Answer
Selected Answer:
b.
Neighbor Solicitation
Correct Answer:
b.
Neighbor Solicitation
Question 650.34 out of 0.34 points
When a router knows a better first hop for a particular address (better than itself), it sends a ____ message to the sender.Answer
Selected Answer:
d.
Redirect
Correct Answer:
d.
Redirect
Question 660.34 out of 0.34 points
The ____ is a multicast address with link-local scope that helps reduce the number of multicast groups to which nodes must subscribe to make themselves available for solicitation by other nodes on their local links.Answer
Selected Answer:
c.
solicited node address
Correct Answer:
c.
solicited node address
Question 670.34 out of 0.34 points
A ____ is a set of packets for which a source requires special handling by the intervening routers.Answer
Selected Answer:
a.
flow
Correct Answer:
a.
flow
Question 680.34 out of 0.34 points
In IPv6, the ____ field (one byte) indicates the upcoming extension header, transport protocol, or other protocol.Answer
Selected Answer:
a.
Next Header
Correct Answer:
a.
Next Header
Question 690.34 out of 0.34 points
Which extension header supports strict or loose source routing for IPv6?Answer
Selected Answer:
c.
Routing
Correct Answer:
c.
Routing
Question 700.34 out of 0.34 points
The ____ process is used to provide source stations with the maximum fragment size supported by a path.Answer
Selected Answer:
d.
PMTU Discovery
Correct Answer:
d.
PMTU Discovery
Question 710.34 out of 0.34 points
____ allows a host to find the information it needs to set up its own IP networking parameters by querying other nodes.Answer
Selected Answer:
b.
Autoconfiguration
Correct Answer:
b.
Autoconfiguration
Question 720.34 out of 0.34 points
Computer security takes advantage of the fact that computer information is basically just numbers. It is based on sets of mathematical manipulations called ____.Answer
Selected Answer:
d.
transformations
Correct Answer:
d.
transformations
Question 730.34 out of 0.34 points
The purpose of ____ is to keep communications secret or private.Answer
Selected d.
Answer: encryption
Correct Answer:
d.
encryption
Question 740.34 out of 0.34 points
____ is the ability of a network to provide better service to specific types of network traffic and is handled by the diffserv working group at the IETF.Answer
Selected Answer:
a.
Quality of Service
Correct Answer:
a.
Quality of Service
Question 750.34 out of 0.34 points
As in IPv4, mobile users in IPv6 require the help of a router located on their home networks, called a ____.Answer
Selected Answer:
c.
home agent
Correct Answer:
c.
home agent