IS3220 CHAPTER 13 Flashcards

1
Q

A data communications technology that enables faster data transmission over copper telephone lines than a conventional voice band modem can provide is called ___?

A

ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A chipset developed and promoted by the US Government as an encryption device to be adopted by telecommunications companies for voice transmission. It was announced in 1993 and discontinued in 1996. This was called ___?

A

CLIPPER CHIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is a standard that defines how Web server software can delegate the generation of Web pages to a console application. They can be written in many programming languages, although scripting languages are often used and are called ___?

A

COMMON GATEWAY INTERFACE (CGI) SCRIPT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network service that resolves fully qualified domain names (FQDNs) into their corresponding IP address. This is an essential service of most networks and their directory services and called ___?

A

DOMAIN NAME SYSTEM (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is a public interest research group in Washington, D.C., to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and Constitutional values in the information age. It pursues a wide range of activities, i.e., privacy research, public education, conferences, litigation, publications, and advocacy. This is called ___?

A

ELECTRONIC PRIVACY INFORMATION CENTER (EPIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network and is called ___?

A

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A computer network authentication protocol that allows nodes communication over a non-secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by Massachusetts Institute of Technology (MIT) that implements this protocol. It was designed as a client-server model, and it provides mutual authentication–both the user and the server verify each other’s identity. This is called ___?

A

KERBEROS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The product of the High Performance Computing and communication Act of 1991. It was a telecommunications policy buzzword, which was popularized during the Clinton administration. It was a proposed advanced, seamless web of public and private communications networks, interactive services, interoperable hardware and software, computers, databases, and consumer electronics to put vast amounts of information at users’ fingertips. This is called ___?

A

NATIONAL INFORMATION INFRASTRUCTURE (NII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a cryptologic intelligence agency of the US Government administered as part of the US DOD. It is responsible for the collection and analysis of foreign communications and roughen signals intelligence, which involves cryptanalysis. It is also responsible for protecting US government communications and information systems from similar agencies elsewhere, which involves cryptography and is called ___?

A

NATIONAL SECURITY AGENCY (NSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Aimed to handle time-series data like network bandwidth, temperatures, CPU load, and so on. The data are stored in a circular buffer database, thus the system storage footprint remains constant over time and is called ___?

A

ROUND-ROBIN DATABASE TOOL (RRDTOOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This has a synchronous interface and traditionally has an asynchronous interface, which means that it responds as quickly as possible to changes in control inputs. It has a synchronous interface, meaning that it waits for a clock signal before responding to control inputs and is therefore synchronized with the computer’s system bus. This is called ___?

A

SYNCHRONOUS DYNAMIC RANDOM ACCESS MEMORY (SDRAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A common packet analyzer that runs at the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached and is called ___?

A

tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A computer network tool used to show the route taken by packets across an IP network. This is called ___?

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. All the following are key features of SmoothWall. EXCEPT:
  2. POP 3
  3. Static and dynamic DNS support
  4. Cybercash support
  5. Snort IDS support
  6. DHCP and Network time server support
A

Cybercash support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. According to the ___ ___ ___, attacks to systems connected to the Internet are becoming more and more complex.
  2. National Systems Agency
  3. National Security Agency
  4. Central Intelligence Agency
  5. Navy Security Agency
  6. Federal Bureau of Investigation
A

National Security Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Firewallling involves two distinct areas that must be protected:
  2. Network and transaction security
  3. Access and controls
  4. File sharing and printing capabilities
  5. Access to the Internet and from the Internet
  6. None of the above
A

Network and transaction security

17
Q
  1. The ___ was created to alert the public on the emerging privacy issues relating to the National Information Infrastructure.
  2. EDIP
  3. EPIC
  4. NII
  5. CERN
  6. W3C
A

EPIC

18
Q
  1. The following are characteristics we should be looking for in a firewall, EXCEPT:
  2. Security Assurance
  3. Privilege Control
  4. Digital Switches
  5. Authentication
  6. Audit Capabilities
A

Digital Switches

19
Q
  1. A good firewall product should provide:
  2. Flexibility
  3. Performance
  4. Scalability
  5. All the above
  6. 1 & 3
A

Flexibility

Performance

Scalability

All the above

20
Q
  1. The following are all characteristics of SmoothWall firewall, EXCEPT:
  2. It is a simple Linux kernel
  3. It cannot use iptables to control and route traffic
  4. It is built to run as a dedicated firewall/router
  5. It provides a way to gain extra capability with NAT
  6. It runs on a variety of hardware
A

It cannot use iptables to control and route traffic

21
Q
  1. The following are all common interfaces used by SmoothWall, EXCEPT:
  2. green: Trusted network
  3. blue: DMZ connection
  4. red: Internet
  5. orange: Filtered/Special Purpose
A

blue: DMZ connection

22
Q
  1. The following are attributes of a minimum hardware specification to run SmoothWall, EXCEPT:
  2. 512MB PC1 SDR AM
  3. 20GB gard drive
  4. 10/100 on-board NIC
  5. AMD Duron 1100
  6. Flat LCD screen
A

Flat LCD screen

23
Q
  1. To install SmoothWall, you need to make sure the computer BIOS is set to boot from a CD.
    TRUE OR FALSE
A

TRUE

24
Q
  1. In a typical SmoothWall firewall installation the green interface should have:
  2. A static IP
  3. Software bugs but not flaws
  4. Dynamic addressing
  5. Proxy servers connected to it
  6. Internal code connecting to an external service
A

A static IP

25
Q
  1. When configuring the NICs for the green interface, it is advisable to use ___:
  2. capacity planning
  3. maximum utilization
  4. a static IP address
  5. wirespeed settings
  6. factory defaults
A

a static IP address

26
Q
  1. Which of the following is not related to SmoothWall offered services?
  2. Web Cache/Proxy
  3. Fingerprint authentication
  4. DHCP Server
  5. DDNS
  6. Intrusion Detection System
A

Fingerprint authentication

27
Q
  1. What does the “Transparent” option mean when configuring Web proxying in SmoothWall?
  2. It allows you to create a tunnel mode
  3. Every client on the network will be forced to connect through the proxy server
  4. Every client on the network will be waived access to the network
  5. The proxy server is on stealth mode
  6. Collisions on the network are not seen
A

Every client on the network will be forced to connect through the proxy server

28
Q
  1. SmoothWall does not work well with Mozilla Firefox and Google Chrome.
    TRUE OR FALSE
A

FALSE

29
Q
  1. The following are services found int he service tab of SmoothWall, EXCEPT:
  2. SQUID
  3. Web Cache/Proxy
  4. DDNS
  5. Diskcopy
  6. SSH
A

Diskcopy

30
Q
  1. The following are tools we can use when troubleshooting a firewall installation, EXCEPT:
  2. ping
  3. traceroute
  4. robocopy
  5. ipconfig
  6. tcpdump
A

robocopy