Chapter 12: Secure Communications and Network Attacks Flashcards

1
Q

____is a Data Link layer protocol that allows for multivendor interoperability of WAN devices supporting serial links.

A

PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______ is a telephone switching or exchange system deployed in private organizations in order to enable multistation use of a small number of external PSTN lines.

A

Private branch exchange (PBX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is the process of removing the TLS-based encryption from incoming traffic to relieve a web server of the processing burden of decrypting and/or encrypting traffic sent.

A

TLS offloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An _____ system is a form of load balancing that uses all available pathways or systems during normal operations.

A

active-active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An _____ system is a form of load balancing that keeps some pathways or systems in an unused dormant state during normal operations.

A

active-passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is an email security standard that offers authentication and confidentiality to email through public key encryption, digital envelopes, and digital signatures. Authentication is provided through X.509 digital certificates issued by trusted third-party CAs.

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is a peer-to-peer public-private key–based email system that uses a variety of encryption algorithms to encrypt files and email messages.

A

Pretty Good Privacy (PGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ is the network communications process that protects the contents of protocol packets by encapsulating them in packets of another protocol.

A

Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ tunnel is a VPN configuration that allows a VPN-connected client system (i.e., remote node) to access both the organizational network over the VPN and the internet directly at the same time.

A

split

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ tunnel is a VPN configuration in which all of the client’s traffic is sent to the organizational network over the VPN link, and then any internet-destined traffic is routed out of the organizational network’s proxy or firewall interface to the internet.

A

full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

private ip addresses ranges for class A, B, and C

A

10.0.0.0–10.255.255.255 (a full Class A range)
172.16.0.0–172.31.255.255 (16 Class B ranges)
192.168.0.0–192.168.255.255 (256 Class C ranges)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______, also known as link-local address assignment (defined in RFC 3927), assigns an IP address to a system in the event of a Dynamic Host Configuration Protocol (DHCP) assignment failure.

A

Automatic Private IP Addressing (APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the widely used ip address for loopback?

A

127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A _____ line (also called a leased line or point-to-point link) is one that is continually reserved for use by a specific customer. It is always on and waiting for traffic to be transmitted over it.

A

dedicated line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____ line is one that requires a connection to be established before data transmission can occur.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly