Chapter Quiz 11-12-14 Flashcards
In a ____ attack, a person redirects or captures secure transmissions as they occur.
a. denial-of service
c. war driving
b. man-in-the-middle
d. phishing
b. man-in-the-middle
A NOS that contains a “back door”is an example of a risk associated with ____.
a. people
b. transmission and hardware
c. protocols and software
d. Internet access
c. protocols and software
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
a. switch’s
b. gateway’s
c. router’s
d. proxy server’s
c. router’s
The combination of a public key and a private key is known as a ____.
a. key lock
b. key frame
c. key pair
d. key set
c. key pair
In ____, a hacker forges name server records to falsify his host’s identity.
a. IP spoofing
b. DNS spoofing
c. ID spoofing
d. DHCP spoofing
b. DNS spoofing
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.
a. charge bypass
b. distance bypass
c. toll bypass
d. easypass
c. toll bypass
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.
a. IP-PBX
b. analog PBX
c. Data PBX
d. IT-PBX
a. IP-PBX
One drawback to ____ video is that content may not be edited before it’s distributed.
a. on demand
b. live streaming
c. streaming server
d. VoIP
b. live streaming
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.
a. call signaling only
b. control only
c. call signaling and control
d. communication between media gateways
c. call signaling and control
____ is a measure of how well a network service matches its expected performance.
a. QoS
b. RSVP
c. DiffServ
d. MPLS
a. QoS
____ is intended to eliminate single points of failure.
a. Availability
b. Redundancy
c. Contingency
d. Integrity
b. Redundancy
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic
c. Signature
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic
d. Heuristic
____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.
a. Redundancy
b. Failover
c. RAID
d. Load balancing
d. Load balancing
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
a. NAS
b. RAID
c. SANs
d. Optical media
c. SANs
A(n) ___identifies an organization’s security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
Security policy
A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Proxy service
____________________ performs the same functions as MGCP, but using different commands and processes.
MEGACO
____________________ is a QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters.
MPLS
____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
Disaster recovery
Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.
Use packet-filtering firewalls to stop worms from spreading. or use ACL to control access of packets
Explain why UDP is preferred over TCP for real-time applications such as telephone conversations and videoconferences.
TCP is connection-oriented
UDP is connectionless
because UDP is connectionless it helps with videoconferences and telephone conversations and becseu of that UDP is faster as it doesn’t need a connection to send packets
What is integrity checking?