Chapter 11 – Secure Network Architecture and Securing Network Components Flashcards

1
Q
  1. What is layer 4 of the OSI model?

Transport

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What is encapsulation?

Adding a header and footer to data as it moves down the OSI stack

A

Adding a header and footer to data as it moves down the OSI stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which OSI model layer manages communications in simplex, half-duplex, and full –duplex modes?
    Session
A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following is the least resistant to EMI?

UTP

A

UTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following is not an example of network segmentation?
    VPN
A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is a field-powered technology that can be used for inventory management without requiring direct physical contact?
    RFID
A

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. If you are victim of a bluejacking attack, what was compromised?
    Your cell phone
A

Your cell phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which networking technology is based on the IEEE 802.3 standard?
    Ethernet
A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What is a TCP wrapper?

An application that can serve as a basic firewall by restricting access based on user IDs or system IDs

A

An application that can serve as a basic firewall by restricting access based on user IDs or system IDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is both a benefit and a potentially harmful implication of multilayer protocols?
    Encapsulation
A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly