First Questions Flashcards

1
Q

PSK Prevents the use of weak keys

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many host addresses are available for this network?

  1. 5.4.0
  2. 255.255.254
A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not one of the three major security planning principles?

A

Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is not a part of AAA

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A benefit of using firewalls is that it eliminates the need to harden each host and therefore saves money.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To allow a connection from an internal host to one or more external hosts requires an ACL rule if a stateful firewall is used.

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is 128.171.13.12:234?

A

A socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A/an _______ specifies a particular application on a particular host.

A

A Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A mask has how many bits?

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A router must use the ARP process when?

A

Whenever it forwards an IP packet to a host that is not in its ARP cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A router will discard a packet if the TTL value reaches ______

A

0 (Zero)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A routing table has 34,569 rows. Rows 12,921 and 26,731 match the destination IP address in an incoming packet. How many rows must the router check for matches?

A

34,569 (Has to go through ALL rows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A TCP ________ segment is a request to open a connection.

A

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Windows host sends a TCP segment with a source port number of 1200 and a destination port of 80. What is the sending host?

A

A Webserver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consider the client computer message (put onto the network) of: “Hello Host 10.19.8.12, What is your 48-Bit MAC Address?”. What protocol is the computer using?

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Consider the client computer message (put onto the network) of: “My 48-bit Ethernet address is the following …-…-..-.. please give me a 32-bit address” Which protocol is the computer using?

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Consider the dotted decimal mask of 255.255.0.0 how many 1s are there in the binary equivalent?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DHCP sends a PC what a or an _____?

A

An IP Address and a Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

For a given volume of traffic, which is/are more expensive?

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Four-way closes use ______ segments.

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Routers use dynamic routing protocols to constantly talk to each other, sharing routing information. What sort of routing information is exchanged? (All that apply)

A

Masks
IP Addresses
Metric Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Routers are normally connected in a _______ Topology

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Routing decisions are done on a combination of what matches?

A

Biggest Prefix and Lowest Metric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The internet control message control protocol is the internet layer supervisory protocol. What diagnostic tool takes advantage of it?

A

N/A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the main benefit of IPv6 ID?
The ability to support more hosts
26
The network part of an IP address is how many bits long?
N/A
27
What is the main version of internet protocol?
IPv4
28
To deliver an arriving packet to a destination host on a subnet connected to a router the router needs what?
N/A
29
To see whether a target host can be reached you would send it an ICMP _______ message.
N/A
30
What does a router do with an ARP message?
N/A
31
What may drive the adoption of IPv6?
A growing number of hosts in other countries (India and China). And a growing number of hosts in general.
32
Which of the segments is not acknowledged?
N/A
33
Core security standards provide security between the wireless station and the wireless access point. Match the various ones below.
``` Crack in 5 minutes = WEP Has been cracked in this course = WPA 802.11i = ? 802.11x = ? 802.11__ = ? ```
34
How many frames in a one way transmission between a wireless client on a server to a ethernet computer?
N/A
35
How long does it take to crack WEP today with the software that is available?
A few minutes
36
If a radio transmission is blocked by obstacles you need to maintain what?
A clear line of sight
37
In ______ when a wireless host wishes to send it uses CSMA/CA+ACK
N/A
38
What secures communication between the wireless computer and the server (or a point near the server)?
VPNs
39
PSK mode uses authentication servers
FALSE
40
Why is IPv6 being used?
N/A
41
How many bits long is an IPv6 address?
128 bits
42
`If a user has the password 'Tiger' what is the best way to crack it?
Dictionary attack
43
If you have already entered into a system and want to get back in, what do you leave?
a Backdoor
44
Collecting and logging information about what employees do when they use a system is called what?
N/A
45
Someone dressed up as a person from Amour-guard and walked into a bank. They proceeded to get the cashier to give them the money meant for the actual Amour-guard and walked out. In networking terms what is this called?
Social Engineering
46
DOS attacks are on what?
N/A
47
Exploit programs that can be remotely controlled by an attacker are called what?
BOTS
48
Passwords should be at least how many characters long?
8 Characters
49
Pieces of code programs that are executed after the virus or worm has spread are called what?
Payloads
50
Programs that hackers use to break into computers are called what?
Exploits
51
Programs that pretend to be system files are called what?
Trojan Horses
52
Requiring identity is what?
Authentication
53
What is it called when you set up hosts to protect themselves?
Host Hardening
54
What is the default behavior of a stateful firewall regarding connection opening?
N/A
55
What is the name for malware on a PC that collects and sends information to an attacker?
N/A
56
Password '245fd' is best hacked by what sort of attack?
A Brute Force
57
Password 'Security7' is best hacked by what sort of attack?
A Hybrid Mode Dictionary Attack
58
Tricking users into doing something that they shouldn't be is called what?
Social Engineering
59
Vulnerabilities are found. What needs to happen?
Defense in Depth
60
When a packet is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall what happens?
The firewall drops the packet
61
If a packet passes without a filter what happens?
The Stateful firewall acknowledges the packet
62
What is a rapidly spreading attack called?
A Worm
63
Is this a valid subnet mask: 255.255.0.0?
YES
64
What is the result of this IP and mask after a router has received them: IP - 192.168.3.4 Mask - 255.255.0.0
IP turns into 192.168.3.0 | Mask turns into N/A