Chapter Quiz 11-12-14 Flashcards
In a ____ attack, a person redirects or captures secure transmissions as they occur.
a. denial-of service
c. war driving
b. man-in-the-middle
d. phishing
b. man-in-the-middle
A NOS that contains a “back door”is an example of a risk associated with ____.
a. people
b. transmission and hardware
c. protocols and software
d. Internet access
c. protocols and software
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
a. switch’s
b. gateway’s
c. router’s
d. proxy server’s
c. router’s
The combination of a public key and a private key is known as a ____.
a. key lock
b. key frame
c. key pair
d. key set
c. key pair
In ____, a hacker forges name server records to falsify his host’s identity.
a. IP spoofing
b. DNS spoofing
c. ID spoofing
d. DHCP spoofing
b. DNS spoofing
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.
a. charge bypass
b. distance bypass
c. toll bypass
d. easypass
c. toll bypass
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.
a. IP-PBX
b. analog PBX
c. Data PBX
d. IT-PBX
a. IP-PBX
One drawback to ____ video is that content may not be edited before it’s distributed.
a. on demand
b. live streaming
c. streaming server
d. VoIP
b. live streaming
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.
a. call signaling only
b. control only
c. call signaling and control
d. communication between media gateways
c. call signaling and control
____ is a measure of how well a network service matches its expected performance.
a. QoS
b. RSVP
c. DiffServ
d. MPLS
a. QoS
____ is intended to eliminate single points of failure.
a. Availability
b. Redundancy
c. Contingency
d. Integrity
b. Redundancy
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic
c. Signature
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic
d. Heuristic
____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.
a. Redundancy
b. Failover
c. RAID
d. Load balancing
d. Load balancing
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
a. NAS
b. RAID
c. SANs
d. Optical media
c. SANs