IS3340 CHAPTER 9 Flashcards

1
Q

Computers that run application programs on behalf of remote user is called ___?

A

APPLICATION SERVERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network cabling that consists of a single copper conductor surrounded with a plastic sheath, then a braided copper shield, and then the external insulation is called ___?

A

COAXIAL CABLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The adapters and wires (sometimes) that connect components together is called ___?
Not all connection methods use wires. Wireless devices use radio waves to transmit data instead of wires.

A

CONNECTION MEDIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An untrusted network created by using one or more firewalls to separate an untrusted network from a trusted network is called ___?

A

DEMILITARIZED ZONE (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack that sends a large volume of network messages that end up flooding the network and making it unusable for legitimate traffic is called ___?

A

DENIAL OF SERVICE (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A SoS attack in which the controller instructs one or more compromised computers to flood a network with packets is called ___?

A

DISTRIBUTED DENIAL OF SERVICE (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network cabling that consists of a glass core surrounded by several layers of protective materials is called ___?

A

FIBER OPTIC CABLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A computer or hardware device that has one or more connected hard disk drives, a network interface, and software to provide network access to files and folders on the attached disks is called ___?

A

FILE SERVER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network device that connects two or more separate networks that use different protocols is called ___?

A

GATEWAY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network device with several connectors, or ports, that allows multiple network cables to attach to it is called ___?

A

HUB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A secure application layer protocol used to transfer encrypted content between Web browsers and Web servers is called ___?

A

HYPERTEXT TRANSPORT PROTOCOL (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This defines standards for wireless local area network (WLAN) communication protocols and is called ___?

A

IEEE802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Defines standards for many aspects of computing and communications. This is called ____?

A

INSTITUTE OF ELECTRICAL AND ELECTRONIC ENGINEERS (IEEE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This connects a LAN to the Internet and is called ___?

A

INTERNET GATEWAY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network that covers a small physical area, such as an office or building is called ___?

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any resource attached to a local computer–the same computer to which the user has logged on is called ___?

A

LOCAL RESOURCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network that connects two or more LANs but does not span an area larger than a city or town is called ___?

A

METROPOLITAN AREA NETWORK (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A collection of computers and devices connected by some connection media is called a ___?

A

NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A technique used in many firewalls that translates internal IP addresses into an external IP address is called ___? This feature hides the true IP address of internal computers from outside nodes.

A

NETWORK ADDRESS TRANSLATION (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hardware devices that connect other devices and computers using connection media is called ___?

A

NETWORKING DEVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Any computer or device connected to a network is called a ___?

A

NODE

22
Q

A generic description for how computers use multiple layers of protocol rules to communicate across a network is called ___?
This reference model defines seven different layers of communication.

A

OPEN SYSEM INTERCONNECTION (OSI) REFERENCE MODEL

23
Q

In the context of network protocols, a numeric identifier that programs use to classify network messages is called ___?

A

PORTS

24
Q

A computer or network device that provides the interface between the network and one or more printers is called ___?

A

PRINT SERVER

25
Q

A set of rules that govern communication is called ___?

A

PROTOCOLS

26
Q

Any resource attached to another computer on a network that is different from the computer to which the user is logged on is called ___?

A

REMOTE RESOURCES

27
Q

A network device that examines the destination address and then forwards the packet to the correct outbound port is called ___?

A

ROUTER

28
Q

Hardware that provides one or more services to users, such as server computers, printers, and network storage devices is called ___?

A

SERVER COMPUTERS AND SERVICES DEVICES

29
Q

A uniques identifier for a wireless network is called ____?

A

SERVICE SET IDENTIFIER (SSID)

30
Q

Network cabling that generally consists of two or four pairs of wires with a foil shielding around each pair to reduce external electrical and redo interference is called ___?
Pairs of wires are twisted around each other to reduce interference with other pairs.

A

SHIELDED TWISTED PAIR (STP)

31
Q

A network hardware device that forwards input it receives only to the appropriate output port is called ___?

A

SWITCH

32
Q

A combination of two separate protocols commonly used in Internet network communication is called ___?

A

(TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP)

33
Q

Network cabling that generally consists of two or more pairs of wires is called ___?
Pairs of wires are twisted around each other to reduce interference with other pairs.

A

UNSHIELDED TWISTED PAIR (UTP)

34
Q

A network that connects multiple LANs and WANs and spans very large areas, including multiple country coverage is called ___?

A

WIDE AREA NETWORK (WAN)

35
Q

A long-running program that performs a specific set of functions, such as a firewall, database server, or a Web server is called ___?

A

WINDOWS SERVICE

36
Q

A LAN in which computers and devices communicate using radio frequency transmissions is called ___?

A

WIRELESS LOCAL AREA NETWORK

37
Q
  1. A ___ is a network that generally spans several city blocks.
A

Metropolitan Area Network (MAN)

38
Q
  1. A local resource is any resource connected to the local LAN.
    TRUE OR FALSE
A

FALSE

39
Q
  1. Which of the following devices repeats input received to all ports?
  2. Switch
  3. Hub
  4. Gateway
  5. Router
A

Hub

40
Q
  1. ___ cabling provides very good protection from interference but is difficult to install.
A

Coaxial

41
Q
  1. Even the newest wireless protocols are slower than using high quality physical cable.
    TRUE OR FALSE
A

TRUE

42
Q
  1. Which LAN device commonly has the ability to filter packets and deny traffic based on the destination address?
  2. Router
  3. Gateway
  4. Hub
  5. Switch
A

Gateway

43
Q
  1. A ___ is an untrusted network that contains Internet-facing servers and is separated from your trusted network by at least one firewall.
A

Demilitarized Zone (DMZ)

44
Q
  1. Which network device feature provides the ability to hide internal network node addresses?
  2. DMZ
  3. NAT
  4. STP
  5. OSI
A

NAT

45
Q
  1. Which network layer reference model includes four layers to describe how computers use multiple layers of protocol rules to communicate across a network?
  2. IEEE
  3. IPSec
  4. UDP
  5. TCP/IP
A

TCP/IP

46
Q
  1. Which of the following actions is NOT an effective way to secure Windows services that you do not use>
  2. Stop it
  3. Disable it
  4. Block it
  5. Remove it
A

Block it

47
Q
  1. You should disable the ___ broadcast to make wireless networks hard to discover.
  2. SSID
  3. NAT
  4. MAC
  5. WPA
A

SSID

48
Q
  1. A successful DoS attack violates which property of the A-I-C Triad?
  2. Availability
  3. Integrity
  4. Consistency
  5. Confidentiality
A

Availability

49
Q
  1. Where must sensitive data only appear encrypted to ensure its confidentiality? (Select two)
  2. While in use in the Workstation
  3. During transmission over the network
  4. As it is stored on disk
  5. In memory
A

During transmission over the network
&
As it is stored on disk

50
Q
  1. Which authentication protocol does Windows Server 2008 use as a default?
  2. NTLM
  3. Kerberos
  4. WPA
  5. NAT
A

Kerberos

51
Q
  1. What can some firewalls do to attempt to stop a DoS attack in progress?
  2. Alert an attack responder
  3. Log all traffic coming from the source of the attack
  4. Terminate any connections with the source of the attack
  5. Reset all connections
A

Terminate any connections with the source of the attack