Chapter 11 Flashcards

1
Q

____ increases reliability by eliminating single points of failure.

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network ___ can be achieved by duplicating network equipment and links (a server form)

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Match instant messaging, FTP, Voice SMTP to their priority.

High, Medium, Normal, Low, Backbone Network

A

Voice - High, SMTP - Medium, Instant messaging - Normal, FTP - Low, SMTP and Instant Messaging -
Backbone Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To scale a network, several elements are required? (4)

A

Network documentation, device inventory, budget, traffic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ are tools to help network administrators understand the protocols in use in the network.

A

Protocol Analyzers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common types of digital threats (4):

A

info, data loss and manipulation, identity theft, disruption of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common types of physical threats (4):

A

hardware, environmental, electrical, maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name three primary vulnerabilities.

A

Technical - protocols, operating system, network equip
Configuration - misconfigured devices, default config values, easily guessed passwords
Security policy - lack of, software/hardware install not consistent with security, no disaster or recovery plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name three types of malware attacks.

A

Virus, worms, trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What aquires info on targeted systems or network to search for vulnerabilities, uses free and/or public internet services, uses port scanners and packet sniffers?

A

Reconnaissance attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What gains access to info to have no right to view, uses password attacks, trust exploitation, port redirection, man in the middle?

A

Access attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What prevents authorized people from using a service by consuming system resources to prevent attacks important to have the latest security and is difficult to eliminate?

A

DOS (denial of service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name common DOS attacks.

A

Ping of death, SYN flood, DDOS, Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To mitigate worm attacks, ____ for all known vulnerabilities must be applied.

A

patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s the best way to keep up to date from attacks?

A

backup, upgrade, patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ control the traffic and helps prevent unauthorized access.

A

Firewalls

17
Q

The ___ command is an effective way to test connectivity.

A

ping

18
Q

Ping uses layer ___ ICMP for connectivity.

A

3

19
Q

What does the ARP command do?

A

Lists all devices currently in the ARP cache of the host, includes IPv4 addresses, physical addresses and the type (dynamic/static) for each device.