80% OF QUESTIONS.DOC Flashcards

1
Q

Match core standards and descriptions: 802.11i

A

Requires encryption key protocols TKIP and AES
Key Caching, pre-authentication (Used for VoIP)
WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Match core standards and descriptions: This can be cracked in approximately 5 minutes

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Match core standards and descriptions: 802.11X

A

Uses a central authentication server - which provides key management.
Also called Enterprise Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Match core standards and descriptions: Part of this standard has been cracked

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A TCP _____ segment is a request to open a connection.

A

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Windows host sends a TCP segment with source port number 1200 and destination port number 80. The sending host is a/an _____.

A

Webserver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the structure of a MAC address?

A

3 byte OUI followed by a 3 byte vendor assigned number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exploit programs that can be remotely controlled by an attacker are _____.

A

BOTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Collecting and logging information about what employees do when they use a system is _____.

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A wireless host sends a packet to a server on the companys wired Ethernet LAN via an access point. How many frames will be involved in this oneway transmission?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In wireless LANs the protocol must be reliable because radio transmission is itself inherently unreliable. The steps taken in wireless LAN transmission are as follows: Sender listens for traffic 1. If there is traffic, the sender waits 2. If there is no traffic: 2a. If there has been no traffic for less than a preset amount of time, waits a random amount of time, then returns to Step 1. 2b, If there has been no traffic for more than a preset amount of time, sends without waiting 3. Receiver immediately sends back an acknowledgement 4. If sender does not receive the acknowledgement, it retransmits What is this protocol called? Choose the correct answer from the following list.

A

CSMA/CA+ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Programs that masquerade as system files are called?

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually _____.

A

Passes the packet without notifying the administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Requiring someone to prove his or her identity is _____.

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The total length of an IP address is ____ bits.

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PSK prevents the use of weak keys

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall, the firewall _____.

A

Drops the packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The process of proving a users identity is called

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Programs that hackers use to break into computers are_____.

A

Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Consider the client computer message (put onto the network) of: “My 48-bit ethernet address is A3-4E-C0-1D-BE-EF. Please give me a 32-bit address.” What is the protocol in use?

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DHCP sends a PC a or an _____.

A

IP Address and Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The main benefit of IPv6 over IPv4 is _____.

A

The ability to support more possible hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How many host addresses are available for the network 10.5.4.0 255.255.255.0?

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

128.171.17.13:1234 is _____.

A

A socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Unsolicited commercial e-mail is _____.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is not part of AAA?

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Four-way closes use ____ segments.

A

FIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Consider the following story: “On Wednesday, a man dressed as an armored truck employee with the company AT Systems walked into a BB&T bank in Wheaton about 11 a.m., was handed more than $500,000 in cash and walked out, a source familiar with the case said. It wasn’t until the actual AT Systems employees arrived at the bank, the next day that bank officials realized they’d been had.” Choose the best description of what just happened from the list below.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following can spread more rapidly?

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A router must use the ARP process ______.

A

Whenever it forwards an IP packet to a host that is not in its ARP cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Pieces of code programs that are executed after the virus or worm has spread are called _____.

A

Payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

To see whether a target host can be reached, you normally would send it an ICMP _____ message.

A

Echo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

_____ is the general name for proofs of identity in authentication.

A

Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The network part of an IP address is _____ bits long.

A

The size of the network part varies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Routers use dynamic routing protocols to constantly talk to each other, sharing routing information. What sort of information is exchanged? Pick all that apply.

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is NOT one of the three major security planning principles?

A

Perimeter defense

37
Q

The Internet Control Message Protocol is the internet layer supervisory protocol. Which of the following diagnostic tools takes advantage of the ICMP protocol? Choose all that apply.

A

Ping

38
Q

A routing table has 34,569 rows. Rows 12,921 and 26,731 match the destination IP address in an incoming packet. How many rows must the router check for matches?

A

34,569

Must check all rows

39
Q

A router will discard a packet if the TTL value reaches _____.

A

0

40
Q

How many host addresses are available for the network 10.5.4.0 255.255.0.0?

A

65536

41
Q

Tricking users into doing something against their best interests is _____.

A

Social Engineering

42
Q

IPv6 is slowly replacing IPv4. Why is this the case?

A

More devices are coming online, and version four has insufficient capacity

43
Q

The default behavior of a stateful firewall regarding connection-opening attempts is to block all connections initiated by _____.

A

External Hosts

44
Q

What happens if two nearby access points use the same channel?

A

They will interfere with each other

45
Q

When an attacker sets up an access point outside the firm to entice internal hosts to associate with it, this is a/an _____.

A

Evil Twin

46
Q

A mask has _____ bits.

A

32

47
Q

Setting up hosts to protect themselves is _____.

A
?
firewalling
 b. self-defense
 c. patching
 d. host hardening
48
Q

The general name for malware on a users PC that collects sensitive information and sends this information to an attacker is _____.

A

Spyware

49
Q

Which of the following secures communication between the wireless computer and the server (or a point near the server)?

A

VPNs

50
Q

Which of the following is more serious?

Credit card theft or Identity theft?

A

Identity Theft

51
Q

The password ‘Security7’ can be defeated most quickly by a _____.

A

Hybrid mode dictionary attack

52
Q

A user picks the password tiger. This is likely to be cracked most quickly by a/an _____.

A

Dictionary Attack

53
Q

Which of the following segments is NOT acknowledged?

A

RST

54
Q

The password ‘7u3&’ can be defeated most quickly by a _____.

A

Brute Force Attack

55
Q

How many host addresses are available for the network 10.5.4.0 255.255.254.0?

A

512

56
Q

How long does it take an attacker to crack WEP today with readily available software?

A

A few minutes

57
Q

Active Directory match with description:

At the highest level in an Active Directory design is the __________.

A

Forest

58
Q

Active Directory match with description:A __________ contains one or more domains that are in a common relationship.

A

Tree

59
Q

Active Directory match with description:An _________ is a grouping of related objects within a domain. This is similar to the idea of having subfolders in a folder.

A

Organisational Units

60
Q

Active Directory match with description:Servers that have the Active Directory Domain Services installed on them are:

A

Domain Controllers

61
Q

Active Directory match with description:Every resources is called an _____________ and is associated with a domain.

A

Object

62
Q

To allow a connection from an internal host to one or more external hosts requires an ACL rule if a stateful firewall is used.

A

False

63
Q

Managing Accounts by grouping them. Match type of group to description: Used to provide access to resources in any domain within a forest.

A

Universal

64
Q

Managing Accounts by grouping them. Match type of group to description: Used when there is a single domain, or to manage resources in a particular domain, so that the global and universal groups can access those resources.

A

Domain Local

65
Q

Managing Accounts by grouping them. Match type of group to description: Used on stand alone servers that are not part of a domain; this type of group does not go beyond the home server.

A

Local

66
Q

Managing Accounts by grouping them. Match type of group to description: Used to manage group accounts from the same domain so that those accounts can access resources in the same and in other domains.

A

Global

67
Q

PSK mode uses authentication servers.

A

FALSE

68
Q

Routers usually are connected in a/an _____ topology.

A

Mesh

69
Q

Consider the client computer message (put onto the network) of: “Hello host 10.19.8.12 what is your 48-bit MAC address?” What is the protocol in use?

A

ARP

70
Q

To drive around a city looking for working access points that are unprotected is _____.

A

War Driving

71
Q

A benefit of using firewalls is that it eliminates the need to harden each host and therefore saves money.

A

False

72
Q

A Windows host sends a TCP segment with source port number 80 and destination port number 1200. It is a/an _____.

A

Email Server

73
Q

UDP is (3)

A

Connection-less
Unreliable
Operates at the transport layer

74
Q

TCP is (2)

A

Reliable

Operates at the Transport layer

75
Q

To deliver an arriving packet to a destination host on a subnet connected to router, the router needs to know the destination hosts _____.

A

IP address and Data-link layer address

76
Q

There are currently two (2) dominant wireless LAN standards in use. Pick the correct answers from the 802.11 standards list below.

A
  1. 11A

802. 11G

77
Q

A/an _____ specifies a particular application on a particular host.

A

Socket

78
Q

What does a router do with ARP request messages?

A

It broadcasts them

79
Q

Routing decisions are done on a combination of best IP match and metrics. Use the following list of routing table rows with their speed metrics, to choose the best match row.

a. Row 852 Prefix /18 Metric 57
b. Row 67 Prefix /12 Metric 30
c. Row 245 Prefix /18 Metric 50
d. Row 1148 Prefix /17 Metric 130

A

Biggest prefix and Lowest metric

A

80
Q

In _____, when a wireless host wishes to send, it first sends a message to the wireless access point asking for permission to send. When the access point sends back a response, the host sending the original message may transmit. All other hosts must wait.

A

CSMA/CA+ACK

81
Q

The main version of Internet Protocol in use today is IP version _____.

A

IPv4

82
Q

Consider the dotted decimal mask of 255.255.0.0, how many 1s are there in the binary equivalent?

A

16

83
Q

Vulnerabilities are occasionally found in even the best security products. Consequently, companies must _____.

A

Have defense in depth

84
Q

DoS attacks are attacks on _____.

A

Availability

85
Q

Passwords should be at least _____ characters long.

A

8

86
Q

What do the ones (1’s) in a network mask correspond to in IP addresses?

A

The Network part

87
Q

IPv6 is the next generation of Internet Protocol. How many bits long is an IPv6 address?

A

128

88
Q

Which of the following may drive the adoption of IPv6?

A

A growing number of hosts in developing countries (especially China and India).
A growing number of mobile devices.

89
Q

A way back into a system that an attacker can use to get into the compromised computer later is called a _____.

A

Backdoor