Exam 2 Flashcards
(83 cards)
At which part of the OSI model does the encapsulation process begin?
application
Which 2 layers of the OSI model are represented by the Link layer of the TCP/IP model?
Data Link and Physical
Which of the following represents the range of port numbers that are referred to a “well-known” port numbers?
0-1023
What is the port number for HTTP?
80
HTTPS=443
Telnet=23
POP3=110
which of the following is NOT and example of a knowledge authentication
A) password
B) mother’s maiden name
C) city of birth
D) smart card
D) smart card
which of the following statements about memory cards and smart cards is false?
A) a memory card is a swipe card that contains user authentication information
B) memory cards are also known as integrated circuit cards
C) smart cards contain memory and an embedded chip
D) smart card systems are more reliable than memory card systems
B) memory cards are not also known as integrated circuit cards smart cards are also known as integrated circuit cards
which biometric method is most effective?
A) Iris scan
B) retina scan
C) Fingerprint
D) handprint
A) Iris scan
What protocol in the TCP/IP suite resolves IP addresses and MAC addresses?
Address Revolution Protocol(ARP)
How many bits are contained in an IPv4 address?
32 bits in either binary or dotted decimal format.
IPv6 are 128 bits and in hexadecimal format.
Which of the following is a Class C address? A. 172.16.5.6 B. 192.168.5.54 C. 10.6.5.8 D. 224.6.6.6
B
Class C addresses range from 192.0.0.0-223.255.255.255
Which of the following is not a valid private IP address? A. 10.2.6.6 B. 172.15.6.6 C. 191.6.6.6 D. 223.54.5.5
A
Class A ranges from 10.0.0.0-10.255.255.255
Class B 172.16.0.0-172.31.255.255
Class C 192.168.0.0-192.168.255.255
Which service converts private IP addresses to public IP addresses? A. DHCP B. DNS C. NAT D. WEP
C, Network Address Translation
Which type of transmission uses stop and start bits? A. Asynchronous B. Unicast C. Multicast D. Synchronous
A
Which protocol encapsulates Fibre Channel frames over Ethernet networks? A. MPLS B. FCoE C. iSCSI D. VoIP
B
Fibre Channel over Ethernet
Which protocol uses port 14? A. RDP B. AFP C. IMAP D. SSH
C
Which of the following best describes NFS?
A. A file-sharing protocol
B. A directory query protocol that is based on X 500
C. An application layer protocol that is used to retrieve information from network devices
D. A client/server file-sharing protocol uses in UNIX/Linux
D
Which of the following is a multi-layer protocol that is used between components in process automation systems in electric and water companies? A. DNP3 B. VoIP C. WPA D. WPA2
A
Which wireless implementation includes MU MIMO? A. 802.11a B.802.11ac C. 802.11g D. 802.11n
B
what is a Type I error in a biometric system?
A) crossover error rate (CER)
B) false rejection rate (FRR)
C) false acceptance rate (FAR)
D) throughput rate
B) false rejection rate (FRR)
a Type 2 error is false acceptance rate (FAR)
which Access Control model is most often used by routers and firewalls to control access to network?
A) discretionary access control
B) mandatory access control
C) rule-based access control
D) role-based access control
C) rule-based access control
which thread is NOT considered a social engineering?
A) Phishing
B) Pharming
C) DoS attack
D) Dumpster diving
C) denial-of-service (DoS) attack
which of the following statements best describes an IDaaS implementation?
A) ensures that any instance of identification and Authentication to a resource is man properly
B) collects and verifies information about an individual to prove that the person who has a valid account is who he or she claims to be
C) provides a set of identity and access management functions to Target system on customers promises and/or in the cloud
D) it isn’t an SAML standard that exchanges authentication and authorization data between organizations or security domains
C) an identity as a service implementation provides a set of identity and access management functions to Target systems on customers
which of the following is an example of multi-factor Authentication?
A) username and password
B) username, retina scan, and smart card
C) retina scan and Fingerprint scan
D) smart card and security token
B) username, retina scan, and smart card
you decide to implement an access control policy that requires the user log on from a certain work stations within your Enterprise. Which type of authentication Factor are you implementing
A) knowledge factor
B) location factor
C) ownership factor
D) characteristic factor
B) Location factor