tcp/ip chapters 9-11 review

26
Question 1 0.34 out of 0.34 points A(n) ____ documents a vulnerability (i.e., a weakness), usually in the context of a recipe, or by including software tools used to mount an attack. Answer Selected Answer: d. expl oit Correct Answer: d. expl oit Question 2 0.34 out of 0.34 points A(n) ____ refers to a successful attempt to compromise a system’s security. Answer Selected Answer: d. break -in Correct Answer: d. break -in Question 3 0.34 out of 0.34 points Trying every likely or possible password for an account is called a(n) ____. Answer Selected Answer: a. brute force attack Correct Answer: a. brute force attack Question 4

Upload: emirstukov

Post on 30-Oct-2014

725 views

Category:

Documents


7 download

DESCRIPTION

TCP/IP Chapters 9-11 Review

TRANSCRIPT

Page 1: TCP/IP Chapters 9-11 Review

Question 10.34 out of 0.34 points

A(n) ____ documents a vulnerability (i.e., a weakness), usually in the context of a recipe, or by including software tools used to mount an attack.Answer

Selected Answer:

 d.

exploit

Correct Answer:

 d.

exploit

Question 20.34 out of 0.34 points

A(n) ____ refers to a successful attempt to compromise a system’s security.Answer

Selected Answer:

 d.

break-in

Correct Answer:

 d.

break-in

Question 30.34 out of 0.34 points

Trying every likely or possible password for an account is called a(n) ____.Answer

Selected Answer:

 a.

brute force attack

Correct Answer:

 a.

brute force attack

Question 40.34 out of 0.34 points

An attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while it’s in transit is called ____.

Page 2: TCP/IP Chapters 9-11 Review

Answer

Selected Answer:

 b.

packet sniffing

Correct Answer:

 b.

packet sniffing

Question 50.34 out of 0.34 points

In a(n) ____ attack, a service is inundated with service requests, or malformed service requests cause a server to hang.Answer

Selected Answer:

 c.

DoS

Correct Answer:

 c.

DoS

Question 60.34 out of 0.34 points

In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side.Answer

Selected Answer:

 b.

Man-in-the middle

Correct Answer:

 b.

Man-in-the middle

Question 70.34 out of 0.34 points

A ____ is a weak spot or known place of attack on any common operating system, application, or service.Answer

Selected Answer:

 a.

hole

Correct  a.

Page 3: TCP/IP Chapters 9-11 Review

Answer: hole

Question 80.34 out of 0.34 points

A ____ is an undocumented and illicit point of entry into an operating system or application added by a system’s programmers to bypass normal security.Answer

Selected Answer:

 c.

back door

Correct Answer:

 c.

back door

Question 90.34 out of 0.34 points

A(n) ____ is a kind of virus that is self-replicating.Answer

Selected Answer:

 a.

worm

Correct Answer:

 a.

worm

Question 100.34 out of 0.34 points

____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature.Answer

Selected Answer:

 a.

Adware

Correct Answer:

 a.

Adware

Question 110.34 out of 0.34 points

Page 4: TCP/IP Chapters 9-11 Review

____ is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer.Answer

Selected Answer:

 a.

Spyware

Correct Answer:

 a.

Spyware

Question 120.34 out of 0.34 points

____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities.Answer

Selected Answer:

 d.

Spoofing

Correct Answer:

 d.

Spoofing

Question 130.34 out of 0.34 points

The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system.Answer

Selected Answer:

 d.

session hijacking

Correct Answer:

 d.

session hijacking

Question 140.34 out of 0.34 points

____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information.Answer

Page 5: TCP/IP Chapters 9-11 Review

Selected Answer:

 b.

Access control

Correct Answer:

 b.

Access control

Question 150.34 out of 0.34 points

____ is the ability to verify that the data received did in fact come from the named source.Answer

Selected Answer:

 c.

Data origin authentication

Correct Answer:

 c.

Data origin authentication

Question 160.34 out of 0.34 points

A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks.Answer

Selected Answer:

 c.

bastion host

Correct Answer:

 c.

bastion host

Question 170.34 out of 0.34 points

A ____ is an area that’s accessible to both outsiders and insiders, but which establishes a buffer area between what’s completely inside and outside a network boundary.Answer

Selected Answer:

 a.

DMZ

Correct  a.

Page 6: TCP/IP Chapters 9-11 Review

Answer: DMZ

Question 180.34 out of 0.34 points

A ____ is a specially, “hardened” software service, or a software/hardware product, that erects a barrier to inspect and control traffic flow between networks.Answer

Selected Answer:

 a.

firewall

Correct Answer:

 a.

firewall

Question 190.34 out of 0.34 points

A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses.Answer

Selected Answer:

 d.

port scanner

Correct Answer:

 d.

port scanner

Question 200.34 out of 0.34 points

____ focuses on documenting network and system configuration data, and monitoring the effects of the use of various versions of hardware and software on network behavior, reliability, and performance.Answer

Selected Answer:

 a.

Configuration management

Correct Answer:

 a.

Configuration management

Question 210.34 out of 0.34 points

Page 7: TCP/IP Chapters 9-11 Review

____ focuses on detecting, logging, and repairing network and system problems (whenever possible) to keep a network operating properly.Answer

Selected Answer:

 a.

Fault management

Correct Answer:

 a.

Fault management

Question 220.34 out of 0.34 points

____ focuses on controlling access to network resources to avoid denials of service and unwanted access or incursions into network resources, and restrict access to resources solely on the basis of proper authentication and authorization.Answer

Selected Answer:

 a.

Security management

Correct Answer:

 a.

Security management

Question 230.34 out of 0.34 points

A(n) ____ management solution supports communications between management agents and the manager device, regardless of the status of the data network.Answer

Selected Answer:

 d.

out-of-band

Correct Answer:

 d.

out-of-band

Question 240.34 out of 0.34 points

____ uses plain text passwords, called community names, or strings, passed between the SNMP client and manager to validate the authenticity of the data and/or the requestor of the data.Answer

Page 8: TCP/IP Chapters 9-11 Review

Selected Answer:

 a.

SNMPv1

Correct Answer:

 a.

SNMPv1

Question 250.34 out of 0.34 points

A(n) ____ is a database of manageable objects for a device.Answer

Selected Answer:

 c.

Management Information Base

Correct Answer:

 c.

Management Information Base

Question 260.34 out of 0.34 points

The ____ MIB is used to monitor and administer remote segments of a distributed network.Answer

Selected Answer:

 c.

Remote Monitoring

Correct Answer:

 c.

Remote Monitoring

Question 270.34 out of 0.34 points

RMON places agents, called ____ at various locations on the distributed network.Answer

Selected Answer:

 b.

network probes

Correct Answer:

 b.

network probes

Question 28

Page 9: TCP/IP Chapters 9-11 Review

0.34 out of 0.34 points

Distributed networks usually evolve over time and become ____.Answer

Selected Answer:

 a.

heterogeneous environments

Correct Answer:

 a.

heterogeneous environments

Question 290.34 out of 0.34 points

The ____ command is used to read a single entry within a MIB.Answer

Selected Answer:

 a.

GET-REQUEST

Correct Answer:

 a.

GET-REQUEST

Question 300.34 out of 0.34 points

When an SNMP manager wants to read a series of entries in a MIB table, it uses the ____ command.Answer

Selected Answer:

 c.

GET-NEXT

Correct Answer:

 c.

GET-NEXT

Question 310.34 out of 0.34 points

The ____ command is the “active controller” for SNMP capabilities and reporting on managed devices.Answer

Selected Answer:

 b.

SET

Correct Answer:

 b.

Page 10: TCP/IP Chapters 9-11 Review

SET

Question 320.34 out of 0.34 points

____ messages are sent gratuitously by the SNMP agent to the SNMP manager when an event setting or “trigger” is exceeded.Answer

Selected Answer:

 b.

TRAP

Correct Answer:

 b.

TRAP

Question 330.34 out of 0.34 points

The ____ community name is used to access the MIB and read the object values.Answer

Selected Answer:

 b.

Read-Only

Correct Answer:

 b.

Read-Only

Question 340.34 out of 0.34 points

The ____ community name is used to change the contents of the MIB.Answer

Selected Answer:

 a.

Read/Write

Correct Answer:

 a.

Read/Write

Question 350.34 out of 0.34 points

The ____ community name is used to access the trap settings on an SNMP manager.Answer

Page 11: TCP/IP Chapters 9-11 Review

Selected Answer:

 c.

Alert

Correct Answer:

 c.

Alert

Question 360.34 out of 0.34 points

In practice, most SNMP consoles are part of a software package commonly called a(n) “____.”Answer

Selected Answer:

 c.

framework

Correct Answer:

 c.

framework

Question 370.34 out of 0.34 points

SNMP is a request/response-based protocol used to transport management messages between a(n) ____ and an SNMP manager.Answer

Selected Answer:

 d.

SNMP agent

Correct Answer:

 d.

SNMP agent

Question 380.34 out of 0.34 points

____ offers the Engineer’s Edition Toolset, a popular suite of SNMP utilities that includes MIB browsers and sweepers.Answer

Selected Answer:

 a.

SolarWinds.net

Correct Answer:

 a.

SolarWinds.net

Page 12: TCP/IP Chapters 9-11 Review

Question 390.34 out of 0.34 points

The first Microsoft operating system to use DNS is Windows ____.Answer

Correct Answer:

 a.

2000

Correct Answer:

 a.

2000

Question 400.34 out of 0.34 points

The preferred form of networking in an all-Windows 2000 and/or Windows XP environment is direct hosting of the (SMB) protocol, with ____ as the domain controller, and DNS for name resolution.Answer

Selected Answer:

 a.

Active Directory

Correct Answer:

 a.

Active Directory

Question 410.34 out of 0.34 points

The Windows 2000 and Windows XP operating systems use a NetBIOS ____ to permit applications, such as SMB and Lotus Notes, to make NetBIOS calls and translate those calls into commands sent to the Windows 2000 and Windows XP TDI.Answer

Selected Answer:

 c.

emulator

Correct Answer:

 c.

emulator

Question 420.34 out of 0.34 points

The ____ driver(s) presents the transport protocols with a common set of entry points for the network adapter(s) installed on the computer.

Page 13: TCP/IP Chapters 9-11 Review

Answer

Selected Answer:

 d.

Network Driver Interface Specification

Correct Answer:

 d.

Network Driver Interface Specification

Question 430.34 out of 0.34 points

____ are used for connectionless “announcement” type traffic, or for request and response traffic that does not require the establishment and maintenance of a reliable connection between two hosts.Answer

Selected Answer:

 c.

Datagrams

Correct Answer:

 c.

Datagrams

Question 440.34 out of 0.34 points

____ is a connectionless protocol.Answer

Selected Answer:

 d.

UDP

Correct Answer:

 d.

UDP

Question 450.34 out of 0.34 points

____ creates and maintains a reliable connection more consistent with NetBIOS session needs.Answer

Selected Answer:

 b.

TCP

Correct Answer:

 b.

TC

Page 14: TCP/IP Chapters 9-11 Review

P

Question 460.34 out of 0.34 points

NetBIOS names are based on the user name during ____ and the information configured for the specific computer in the Network applet in Control Panel.Answer

Correct Answer:

 b.

logon

Correct Answer:

 b.

logon

Question 470.34 out of 0.34 points

NetBIOS ____ names resolve to a single address.Answer

Selected Answer:

 a.

unique

Correct Answer:

 a.

unique

Question 480.34 out of 0.34 points

NetBIOS names are ____ characters in length and are divided into two parts.Answer

Selected Answer:

 c.

16

Correct Answer:

 c.

16

Question 490.34 out of 0.34 points

A(n) ____ registers and resolves names by using only broadcasts.Answer

Selected Answer:

 c.

b-

Page 15: TCP/IP Chapters 9-11 Review

node

Correct Answer:

 c.

b-node

Question 500.34 out of 0.34 points

A(n) ____ attempts to register and resolve names using the local WINS server.Answer

Selected Answer:

 b.

p-node

Correct Answer:

 b.

p-node

Question 510.34 out of 0.34 points

When a(n) ____ computer or process shuts down gracefully, it sends a Name Release Request packet to the WINS server to indicate that it is no longer using the name, thus releasing the name.Answer

Selected Answer:

 c.

p-node

Correct Answer:

 c.

p-node

Question 520.34 out of 0.34 points

____ methods are used only when broadcast methods fail.Answer

Selected Answer:

 d.

P-node

Correct Answer:

 d.

P-node

Question 530.34 out of 0.34 points

Page 16: TCP/IP Chapters 9-11 Review

The ____ is a hybrid that uses the p-node method as its first choice.Answer

Selected Answer:

 b.

h-node

Correct Answer:

 b.

h-node

Question 540.34 out of 0.34 points

____ is a server service, running under Windows NT Server,Windows 2000 Server, or Windows Server 2003.Answer

Selected Answer:

 c.

WINS

Correct Answer:

 c.

WINS

Question 550.34 out of 0.34 points

The ____ command-line tool in Windows Server 2003 is helpful for WINS servers over WAN links to better manage slower network connections.Answer

Selected Answer:

 b.

Netsh

Correct Answer:

 b.

Netsh

Question 560.34 out of 0.34 points

M/S DNS servers in the ____ domain provide reverse lookup, returning the name(s) associated with a particular IP address.Answer

Selected Answer:

 d.

in-addr.arp

Page 17: TCP/IP Chapters 9-11 Review

a

Correct Answer:

 d.

in-addr.arpa

Question 570.34 out of 0.34 points

Which of the following is not true concerning differences between IPv4 and IPv6?Answer

Selected Answer:

 b.

IPv4 uses both TCP and UDP for transport whereas IPv6 only uses TCP.

Correct Answer:

 b.

IPv4 uses both TCP and UDP for transport whereas IPv6 only uses TCP.

Question 580.34 out of 0.34 points

Multicast addresses in IPv6 use a four-bit ____, which is a four-bit field that limits the valid range for a multicast address to define the portion of the Internet over which the multicast group is valid.Answer

Selected Answer:

 d.

scope identifier

Correct Answer:

 d.

scope identifier

Question 590.34 out of 0.34 points

Nodes that need to tunnel IPv6 packets through IPv4 routers use the IPv4-compatible addresses. These are called dual ____.Answer

Selected Answer:

 d.

stack nodes

Correct Answer:

 d.

stack nodes

Page 18: TCP/IP Chapters 9-11 Review

Question 600.34 out of 0.34 points

____ is the name of a special IP address that allows a host on a network to check the operation of its own local TCP/IP protocol stack.Answer

Selected Answer:

 b.

Loopback

Correct Answer:

 b.

Loopback

Question 610.34 out of 0.34 points

____ must announce that they wish to receive multicast traffic bound for a particular multicast address.Answer

Correct Answer:

 c.

Nodes

Correct Answer:

 c.

Nodes

Question 620.34 out of 0.34 points

A special type of multicast address called the ____ address is used to support Neighbor Solicitation (NS).Answer

Selected Answer:

 b.

solicited node

Correct Answer:

 b.

solicited node

Question 630.34 out of 0.34 points

IPv6 ____ protocol, specified in RFC 2461, defines mechanisms whereby nodes can find out on what link they are located, learn their subnet prefix, where the link’s working routers reside, who their neighbors are, which of them is active, and in all cases, to associate a

Page 19: TCP/IP Chapters 9-11 Review

link layer address (such as an Ethernet MAC address) with an IPv6 address.Answer

Selected Answer:

 b.

Neighbor Discovery

Correct Answer:

 b.

Neighbor Discovery

Question 640.34 out of 0.34 points

A node can send a ____ to find (or verify) the link layer address of a local node, see if that node is still available, or check that its own address is not in use by another node.Answer

Selected Answer:

 b.

Neighbor Solicitation

Correct Answer:

 b.

Neighbor Solicitation

Question 650.34 out of 0.34 points

When a router knows a better first hop for a particular address (better than itself), it sends a ____ message to the sender.Answer

Selected Answer:

 d.

Redirect

Correct Answer:

 d.

Redirect

Question 660.34 out of 0.34 points

The ____ is a multicast address with link-local scope that helps reduce the number of multicast groups to which nodes must subscribe to make themselves available for solicitation by other nodes on their local links.Answer

Page 20: TCP/IP Chapters 9-11 Review

Selected Answer:

 c.

solicited node address

Correct Answer:

 c.

solicited node address

Question 670.34 out of 0.34 points

A ____ is a set of packets for which a source requires special handling by the intervening routers.Answer

Selected Answer:

 a.

flow

Correct Answer:

 a.

flow

Question 680.34 out of 0.34 points

In IPv6, the ____ field (one byte) indicates the upcoming extension header, transport protocol, or other protocol.Answer

Selected Answer:

 a.

Next Header

Correct Answer:

 a.

Next Header

Question 690.34 out of 0.34 points

Which extension header supports strict or loose source routing for IPv6?Answer

Selected Answer:

 c.

Routing

Correct Answer:

 c.

Routing

Page 21: TCP/IP Chapters 9-11 Review

Question 700.34 out of 0.34 points

The ____ process is used to provide source stations with the maximum fragment size supported by a path.Answer

Selected Answer:

 d.

PMTU Discovery

Correct Answer:

 d.

PMTU Discovery

Question 710.34 out of 0.34 points

____ allows a host to find the information it needs to set up its own IP networking parameters by querying other nodes.Answer

Selected Answer:

 b.

Autoconfiguration

Correct Answer:

 b.

Autoconfiguration

Question 720.34 out of 0.34 points

Computer security takes advantage of the fact that computer information is basically just numbers. It is based on sets of mathematical manipulations called ____.Answer

Selected Answer:

 d.

transformations

Correct Answer:

 d.

transformations

Question 730.34 out of 0.34 points

The purpose of ____ is to keep communications secret or private.Answer

Selected  d.

Page 22: TCP/IP Chapters 9-11 Review

Answer: encryption

Correct Answer:

 d.

encryption

Question 740.34 out of 0.34 points

____ is the ability of a network to provide better service to specific types of network traffic and is handled by the diffserv working group at the IETF.Answer

Selected Answer:

 a.

Quality of Service

Correct Answer:

 a.

Quality of Service

Question 750.34 out of 0.34 points

As in IPv4, mobile users in IPv6 require the help of a router located on their home networks, called a ____.Answer

Selected Answer:

 c.

home agent

Correct Answer:

 c.

home agent