Chapter Quiz 11-12-14 Flashcards

1
Q

In a ____ attack, a person redirects or captures secure transmissions as they occur.
a. denial-of service
c. war driving
b. man-in-the-middle
d. phishing

A

b. man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A NOS that contains a “back door”is an example of a risk associated with ____.
a. people
b. transmission and hardware
c. protocols and software
d. Internet access

A

c. protocols and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
a. switch’s
b. gateway’s
c. router’s
d. proxy server’s

A

c. router’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The combination of a public key and a private key is known as a ____.
a. key lock
b. key frame
c. key pair
d. key set

A

c. key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In ____, a hacker forges name server records to falsify his host’s identity.
a. IP spoofing
b. DNS spoofing
c. ID spoofing
d. DHCP spoofing

A

b. DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.
a. charge bypass
b. distance bypass
c. toll bypass
d. easypass

A

c. toll bypass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.
a. IP-PBX
b. analog PBX
c. Data PBX
d. IT-PBX

A

a. IP-PBX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One drawback to ____ video is that content may not be edited before it’s distributed.
a. on demand
b. live streaming
c. streaming server
d. VoIP

A

b. live streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.
a. call signaling only
b. control only
c. call signaling and control
d. communication between media gateways

A

c. call signaling and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is a measure of how well a network service matches its expected performance.
a. QoS
b. RSVP
c. DiffServ
d. MPLS

A

a. QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ is intended to eliminate single points of failure.
a. Availability
b. Redundancy
c. Contingency
d. Integrity

A

b. Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic

A

c. Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic

A

d. Heuristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.
a. Redundancy
b. Failover
c. RAID
d. Load balancing

A

d. Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ are distinct networks of storage devices that communicate directly with each other and with other networks.
a. NAS
b. RAID
c. SANs
d. Optical media

A

c. SANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A(n) ___identifies an organization’s security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.

A

Security policy

17
Q

A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

A

Proxy service

18
Q

____________________ performs the same functions as MGCP, but using different commands and processes.

A

MEGACO

19
Q

____________________ is a QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters.

A

MPLS

20
Q

____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.

A

Disaster recovery

21
Q

Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.

A

Use packet-filtering firewalls to stop worms from spreading. or use ACL to control access of packets

22
Q

Explain why UDP is preferred over TCP for real-time applications such as telephone conversations and videoconferences.

A

TCP is connection-oriented
UDP is connectionless

because UDP is connectionless it helps with videoconferences and telephone conversations and becseu of that UDP is faster as it doesn’t need a connection to send packets

23
Q

What is integrity checking?

A