First Questions Flashcards

1
Q

PSK Prevents the use of weak keys

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many host addresses are available for this network?

  1. 5.4.0
  2. 255.255.254
A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not one of the three major security planning principles?

A

Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is not a part of AAA

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A benefit of using firewalls is that it eliminates the need to harden each host and therefore saves money.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To allow a connection from an internal host to one or more external hosts requires an ACL rule if a stateful firewall is used.

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is 128.171.13.12:234?

A

A socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A/an _______ specifies a particular application on a particular host.

A

A Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A mask has how many bits?

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A router must use the ARP process when?

A

Whenever it forwards an IP packet to a host that is not in its ARP cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A router will discard a packet if the TTL value reaches ______

A

0 (Zero)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A routing table has 34,569 rows. Rows 12,921 and 26,731 match the destination IP address in an incoming packet. How many rows must the router check for matches?

A

34,569 (Has to go through ALL rows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A TCP ________ segment is a request to open a connection.

A

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Windows host sends a TCP segment with a source port number of 1200 and a destination port of 80. What is the sending host?

A

A Webserver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consider the client computer message (put onto the network) of: “Hello Host 10.19.8.12, What is your 48-Bit MAC Address?”. What protocol is the computer using?

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Consider the client computer message (put onto the network) of: “My 48-bit Ethernet address is the following …-…-..-.. please give me a 32-bit address” Which protocol is the computer using?

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Consider the dotted decimal mask of 255.255.0.0 how many 1s are there in the binary equivalent?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DHCP sends a PC what a or an _____?

A

An IP Address and a Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

For a given volume of traffic, which is/are more expensive?

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Four-way closes use ______ segments.

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Routers use dynamic routing protocols to constantly talk to each other, sharing routing information. What sort of routing information is exchanged? (All that apply)

A

Masks
IP Addresses
Metric Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Routers are normally connected in a _______ Topology

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Routing decisions are done on a combination of what matches?

A

Biggest Prefix and Lowest Metric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The internet control message control protocol is the internet layer supervisory protocol. What diagnostic tool takes advantage of it?

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the main benefit of IPv6 ID?

A

The ability to support more hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The network part of an IP address is how many bits long?

A

N/A

27
Q

What is the main version of internet protocol?

A

IPv4

28
Q

To deliver an arriving packet to a destination host on a subnet connected to a router the router needs what?

A

N/A

29
Q

To see whether a target host can be reached you would send it an ICMP _______ message.

A

N/A

30
Q

What does a router do with an ARP message?

A

N/A

31
Q

What may drive the adoption of IPv6?

A

A growing number of hosts in other countries (India and China). And a growing number of hosts in general.

32
Q

Which of the segments is not acknowledged?

A

N/A

33
Q

Core security standards provide security between the wireless station and the wireless access point. Match the various ones below.

A
Crack in 5 minutes = WEP
Has been cracked in this course = WPA
802.11i = ?
802.11x = ?
802.11\_\_ = ?
34
Q

How many frames in a one way transmission between a wireless client on a server to a ethernet computer?

A

N/A

35
Q

How long does it take to crack WEP today with the software that is available?

A

A few minutes

36
Q

If a radio transmission is blocked by obstacles you need to maintain what?

A

A clear line of sight

37
Q

In ______ when a wireless host wishes to send it uses CSMA/CA+ACK

A

N/A

38
Q

What secures communication between the wireless computer and the server (or a point near the server)?

A

VPNs

39
Q

PSK mode uses authentication servers

A

FALSE

40
Q

Why is IPv6 being used?

A

N/A

41
Q

How many bits long is an IPv6 address?

A

128 bits

42
Q

`If a user has the password ‘Tiger’ what is the best way to crack it?

A

Dictionary attack

43
Q

If you have already entered into a system and want to get back in, what do you leave?

A

a Backdoor

44
Q

Collecting and logging information about what employees do when they use a system is called what?

A

N/A

45
Q

Someone dressed up as a person from Amour-guard and walked into a bank. They proceeded to get the cashier to give them the money meant for the actual Amour-guard and walked out. In networking terms what is this called?

A

Social Engineering

46
Q

DOS attacks are on what?

A

N/A

47
Q

Exploit programs that can be remotely controlled by an attacker are called what?

A

BOTS

48
Q

Passwords should be at least how many characters long?

A

8 Characters

49
Q

Pieces of code programs that are executed after the virus or worm has spread are called what?

A

Payloads

50
Q

Programs that hackers use to break into computers are called what?

A

Exploits

51
Q

Programs that pretend to be system files are called what?

A

Trojan Horses

52
Q

Requiring identity is what?

A

Authentication

53
Q

What is it called when you set up hosts to protect themselves?

A

Host Hardening

54
Q

What is the default behavior of a stateful firewall regarding connection opening?

A

N/A

55
Q

What is the name for malware on a PC that collects and sends information to an attacker?

A

N/A

56
Q

Password ‘245fd’ is best hacked by what sort of attack?

A

A Brute Force

57
Q

Password ‘Security7’ is best hacked by what sort of attack?

A

A Hybrid Mode Dictionary Attack

58
Q

Tricking users into doing something that they shouldn’t be is called what?

A

Social Engineering

59
Q

Vulnerabilities are found. What needs to happen?

A

Defense in Depth

60
Q

When a packet is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall what happens?

A

The firewall drops the packet

61
Q

If a packet passes without a filter what happens?

A

The Stateful firewall acknowledges the packet

62
Q

What is a rapidly spreading attack called?

A

A Worm

63
Q

Is this a valid subnet mask: 255.255.0.0?

A

YES

64
Q

What is the result of this IP and mask after a router has received them:
IP - 192.168.3.4
Mask - 255.255.0.0

A

IP turns into 192.168.3.0

Mask turns into N/A