IS3220 CHAPTER 5 Flashcards

1
Q

A legacy protocol developed by Apple Inc. for use in networks hosting mainly Macintosh computers. Mostly replaced by TCP/IP and is called ___?

A

APPLETALK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Portions of a software system that unauthenicated users can run is called ___?

A

ATTACK SURFACE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A form of password or encryption key cracking attack that tries all possible valid combinations from a defined set of possibilities is called ___?
This will eventually generate a valid solution given enough time, assuming the hacker uses the correct set of possibilities. This is called ___?

A

BRUTE FORCE ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network design based on a single backbone cable to which all host segments connect is called ___?
Ethernet is logically this type of technology, although it can operate in numerous other phial topologies.

A

BUS TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A form of password or encryption key-cracking attack that uses a pre-contructed list of potential passwords or encryption keys is called ___?

A

DICTIONARY ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A protocol and a data exchange system commonly used over TCP/IP networks, including the Internet, but which is unencrypted and performs authentication and data transfer in plaintext is called ___?

A

FILE TRANSFER PROTOCOL (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network design that establishes all possible connections between hosts is called ___?
This is the most fault-tolerating topology possible, but is also the least resistant to propagation of malware.

A

FULL MESH TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A form of password or encryption key-cracking attack that combines dictionary attacks with brute force attacks is called ___?
A dictionary list provides seed values to a brute force attack tool that makes modifications to the seed value. A very effective attack against users who mistakenly believe that changing a few characters or adding a few characters to a base password is actually improving the password’s strength.

A

HYBRID ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The entity responsible for global coordination of IP addressing, DNS root, and other Internet protocol resources is called ___?

A

INTERNET ASSIGNED NUMBERS AUTHORITY (IANA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The accumulation of delay each time a communication signal crosses a node or host is called ___?
Some amount of delay occurs between reception on one interface and transmission out another interface.

A

LATENCY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network design in which hosts are connected end-to-end, each system being connected to no more than two others is called ___?

A

LINE TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A description of the arrangement of network devices and how they communicate with each other and is a function of network protocols that may not reflect the actual physical topology of the network is called ___?

A

LOGICAL TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of simulating and testing a new concept, design, programming, technique, and so forth before deployment into a production environment is called ___? It often occurs before piloting.

A

MODELING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A transport layer protocol used for file and printer sharing over TCP/IP is called ___?
Originally developed in 1983 as an application-programming interface (API) for software communications, the protocol was extended to encapsulate this information in TCP and UDP packets.

A

NETBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An application-programming interface (API) developed by IBM in 1985 to emulate NetBIOS on a token ring network and still used by Microsoft to describe a transport layer protocol for file and print sharing over Ethernet is called ___? It makes extensive use of broadcast messages and thus introduces additional traffic to a network.

A

NETBIOS EXTENDED USER INTERFACE (NETBEUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The protocol used by the USENET message service. USENET is a persistent message service that allows anyone to post and read messages from over 100,000 named categorized, topical newsgroups is called ___?

A

NETWORK NEWS TRANSFER PROTOCOL (NNTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A mesh network design that establishes many but not all possible host-to-host links is called ___?

A

PARTIAL MESH TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The actual cable structure connecting hosts and nodes together is called ___? This may be independent of logical topology.

A

PHYSICAL TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Using a new service, device, configuration, software, and so on to a limited number of testing hosts before rolling out the new component to the entire production environment is called ___?
This often occurs after modeling. AKA beta testing.

A

PILOTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An application layer protocol used by email clients to receive messages from an email server is called ___? The default TCP/IP port is 110, and it does not encrypt communications. The companion SMTP protocol sends messages to an email server.

A

POST OFFICE PROTOCOL (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The feature of network design that ensures the existence of multiple pathways of communication is called ____? The purpose is to prevent or avoid single points of failure.

A

REDUNDANCY

22
Q

The five regional organizations that oversee and monitor the allocation and registration of IP addresses (both IPv4 and IPv6) is called ___? It consists of American Registry for Internet Numbers (ARIN), RIPE Network Coordination Center (RIPE NCC), etc.

A

REGIONAL INTERNET REGISTRY (TIT)

23
Q

A network design where host segments are attached to a central cable ring is called ___?

A

RING TOPOLOGY

24
Q

A form of security based on hiding details of a system, or creating convolutions that are difficult to understand is called ___?
Such strategies do not usually resist a persistent attack, and are used when true security is poorly understood or the perceived threat is insufficient to overcome the obscure methodology.

A

SECURITY THROUGH OBSCURITY

25
Q

An application-layer protocol used by email clients to send messages to an email server and is also used to relay messages between email servers is called ___? The default TCP/IP port is25, and it does not encrypt communications. The companion POP protocol receives messages from an email server.

A

SIMPLE MAIL TRANSFER PROTOCOL (SMTP)

26
Q

A network design in which host segments radiate from a central node and is called ___?

A

STAR TOPOLOGY

27
Q

The process of dividing a block of computer network addresses into smaller blocks that contain a common set of high-order address bits, called a routing prefix is called ___?
This is typically servers by a single router.

A

SUBNETTING

28
Q

Time, money, and effort already spent on a project, event, or device is called ___?
In economics, this is irrelevant to future decisions. Emotionally, however, people often use this as a rationalization to continue failing processes or procedures.

A

SUNK COST

29
Q

A legacy networking protocol developed by IBM commonly used to support communications between mainframes is called ___?
Mostly replaced by TCP/IP.

A

SYSTEMS NETWORK ARCHITECTURE (SNA)

30
Q

A protocol and a service used to remotely control or administer a host through a plaintext command line interface is called ___?

A

TELNET

31
Q

An arrangement of networking segments, hosts, and nodes is called ___?
Common examples include bus, star, ring, full mesh, partial mesh, tree, and line.

A

TOPOLOGY

32
Q

A network design that organizes hosts into a hierarchy with each host connected upstream to a single parent, but can be connected downstream to none, one, or many hosts is called ___?

A

TREE TOPOLOGY

33
Q
  1. which of the following is NOT an important factor when included as part of network design?
  2. Usability
  3. Capacity
  4. Obscurity
  5. Growth
  6. Defense-in-depth
A

Obscurity

34
Q
  1. All the following are elements of network design EXCEPT?
  2. Satisfying security goals
  3. Understanding of the seven domains of IT infrastructure
  4. Implementing multiple layers of defense
  5. Thorough research and planning
  6. Utilizing a single vendor
A

Utilizing a single vendor

35
Q
  1. Which IT infrastructure domain does NOT require firewalls to be included as part of its network design?
  2. Workstation domain
  3. LAN domain
  4. User domain
  5. Remote Access domain
  6. System/Application domain
A

User domain

36
Q
  1. Which of the following is a benefit of private addressing that is NOT present in public addressing?
  2. Isolation from the Internet
  3. Subnetting
  4. Use of IPv6
  5. Use of IPv6
  6. Routing traffic
  7. Filtering by source and designation address
A

Isolation from the Internet

37
Q
  1. Why would a network implement public addresses internally instead of private addresses?
  2. Avoid the use of NAT
  3. Be able to custom subnet
  4. Maintain isolation from the Internet
  5. Prevent external initiation of communications with internal hosts
  6. Reduce costs
A

Avoid the use of NAT

38
Q
  1. How can static addresses by simulated with DHCP?
  2. Round robin assignment
  3. Manual configuration on each host
  4. Duplicate MAC addresses
  5. Reservations
  6. DNS revers lookup
A

Reservations

39
Q
  1. Which of the following is a flaw or weakness that both static and dynamic addressing share?
  2. Assignment server can go offline
  3. Changes requires manual modification on each host
  4. Public queries will fail
  5. Hackers can spoof valid addresses
  6. The fire sty half of the address identifies the NIC vendor
A

Hackers can spoof valid addresses

40
Q
  1. what is a primary benefit of system hardening?
  2. It reduces user performance
  3. It increases network throughput
  4. It decreases the attack surface
  5. It improves host ROI
  6. It tracks attempted intrusions
A

It decreases the attack surface

41
Q
  1. All of the following are elements of system hardening EXCEPT?
  2. Removing unnecessary protocols, services, and applications
  3. Implement ingress and egress filtering against spoofed addresses
  4. Installing patches and updates
  5. Configure encryption for storage and communication
  6. Installing antivirus and a host firewall
A

.

42
Q
  1. All the following are true statements about system hardening EXCEPT?
  2. System hardening is a one-time process that does not need to be repeated on the same host
  3. System hardening removes or reduces many known vulnerabilities
  4. System hardening is different for each system with a unique function
  5. System hardening is dependent on the location or placement of a host within the seven common domains of an IT infrastructure
  6. Any system discovered to be out of compliance with system hardening guidelines should be quarantined until it can be repaired
A

System hardening is a one-time process that does not need to be repeated on the same host

43
Q
  1. System hardening should be applied to all of the following EXCEPT?
  2. Clients
  3. Servers
  4. Switches
  5. Routers
  6. Cable adapters
A

Cable adapters

44
Q
  1. Which of the following is NOT usually part of the system hardening process?
  2. Update hardware firmware or BIOS
  3. Install additional RAM
  4. Configure a backup process
  5. Configure account lockout
  6. Replace outdated device drivers
A

Install additional RAM

45
Q
  1. What is the essential purpose of function of authentication?
  2. control access to resources
  3. Monitor for security compliance
  4. Watch levels of performance
  5. Verify entity identity
  6. Prevent distribution of malware
A

Verify entity identity

46
Q
  1. what is the essential purpose or function of authorization?
  2. Grant or deny access to resources
  3. Check policy compliance
  4. Identify entities
  5. Monitor levels of utilization
  6. Detect spoofed content
A

Grant or deny access to resources

47
Q
  1. What is the essential purpose or function of accounting?
  2. Detect intrusions
  3. Prove identity
  4. Control access to assets
  5. Record the activities and events within a system
  6. Throttle transactions
A

Record the activities and events within a system

48
Q
  1. what is the essential purpose or function of encryption?
  2. Verify integrity
  3. Prove the identity of endpoints
  4. Protect content from unauthorized third parties
  5. Maintain performance
  6. Validate parking
A

Protect content from unauthorized third parties

49
Q
  1. A remote host has all of the following additional security issues or concerns in comparison with a local host EXCEPT?
  2. Potential exposure to unfiltered Internet
  3. Poor end user training
  4. Greater risk of physical theft
  5. Possible lack of patches and updates
  6. Additional interaction with external entities
A

Poor end user training

50
Q
  1. which of the following is a protection against a single point of failure?
  2. Encryption
  3. filtering
  4. Auditing
  5. Redundancy
  6. VPNs
A

Redundancy

51
Q
  1. when performing node security on a router, all of the following are important concerns, EXCEPT?
  2. Block all directed IP broadcasts
  3. Disable echo, chargen, discard, and daytime
  4. Watch for MAC spoofing
  5. Drop RFC 1918 addressed packets from the Internet
  6. Enable a warning banner for all attempted connections
A

Watch for MAC spoofing

52
Q
  1. When configuring node security on a switch, all of the folioing are important elements EXCEPT?
  2. Enable keystroke logging
  3. Limit access to management interfaces
  4. Monitor for ARP flooding
  5. Upgrade to SNMP v3
  6. Use a final version of firmware
A

Enable keystroke logging