80% OF QUESTIONS.DOC Flashcards
Match core standards and descriptions: 802.11i
Requires encryption key protocols TKIP and AES
Key Caching, pre-authentication (Used for VoIP)
WPA2
Match core standards and descriptions: This can be cracked in approximately 5 minutes
WEP
Match core standards and descriptions: 802.11X
Uses a central authentication server - which provides key management.
Also called Enterprise Mode
Match core standards and descriptions: Part of this standard has been cracked
WPA
A TCP _____ segment is a request to open a connection.
SYN
A Windows host sends a TCP segment with source port number 1200 and destination port number 80. The sending host is a/an _____.
Webserver
What is the structure of a MAC address?
3 byte OUI followed by a 3 byte vendor assigned number
Exploit programs that can be remotely controlled by an attacker are _____.
BOTS
Collecting and logging information about what employees do when they use a system is _____.
Auditing
A wireless host sends a packet to a server on the companys wired Ethernet LAN via an access point. How many frames will be involved in this oneway transmission?
2
In wireless LANs the protocol must be reliable because radio transmission is itself inherently unreliable. The steps taken in wireless LAN transmission are as follows: Sender listens for traffic 1. If there is traffic, the sender waits 2. If there is no traffic: 2a. If there has been no traffic for less than a preset amount of time, waits a random amount of time, then returns to Step 1. 2b, If there has been no traffic for more than a preset amount of time, sends without waiting 3. Receiver immediately sends back an acknowledgement 4. If sender does not receive the acknowledgement, it retransmits What is this protocol called? Choose the correct answer from the following list.
CSMA/CA+ACK
Programs that masquerade as system files are called?
Trojan Horses
When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually _____.
Passes the packet without notifying the administrator
Requiring someone to prove his or her identity is _____.
?
The total length of an IP address is ____ bits.
32
PSK prevents the use of weak keys
FALSE
When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall, the firewall _____.
Drops the packet
The process of proving a users identity is called
Authentication
Programs that hackers use to break into computers are_____.
Exploits
Consider the client computer message (put onto the network) of: “My 48-bit ethernet address is A3-4E-C0-1D-BE-EF. Please give me a 32-bit address.” What is the protocol in use?
DHCP
DHCP sends a PC a or an _____.
IP Address and Subnet Mask
The main benefit of IPv6 over IPv4 is _____.
The ability to support more possible hosts
How many host addresses are available for the network 10.5.4.0 255.255.255.0?
256
128.171.17.13:1234 is _____.
A socket
Unsolicited commercial e-mail is _____.
Spam
Which of the following is not part of AAA?
Auditing
Four-way closes use ____ segments.
FIN
Consider the following story: “On Wednesday, a man dressed as an armored truck employee with the company AT Systems walked into a BB&T bank in Wheaton about 11 a.m., was handed more than $500,000 in cash and walked out, a source familiar with the case said. It wasn’t until the actual AT Systems employees arrived at the bank, the next day that bank officials realized they’d been had.” Choose the best description of what just happened from the list below.
Social Engineering
Which of the following can spread more rapidly?
Worms
A router must use the ARP process ______.
Whenever it forwards an IP packet to a host that is not in its ARP cache
Pieces of code programs that are executed after the virus or worm has spread are called _____.
Payloads
To see whether a target host can be reached, you normally would send it an ICMP _____ message.
Echo
_____ is the general name for proofs of identity in authentication.
Credentials
The network part of an IP address is _____ bits long.
The size of the network part varies
Routers use dynamic routing protocols to constantly talk to each other, sharing routing information. What sort of information is exchanged? Pick all that apply.
?