Mid Term Exam Flashcards
86%
What is the most likely weak link when using asymmetric encryption for verifying message integrity and nonrepudiation?
Question 1 options:
the source of the public keys
the integrity of the private keys
the use of the sender’s private key
the hashing algorithm used to generate a message digest
the source of the public keys *
If you see a /16 in the header of a snort rule, what does it mean?
Question 2 options:
the detected signature is 16 bits in length
the size of the log file is 16 MB
the subnet mask is 255.255.0.0
a maximum of 16 log entries should be kept
the subnet mask is 255.255.0.0 *
Which layer does wireless communication rely heavily upon?
Question 3 options:
LLC sublayer of the Transport layer
MAC sublayer of the Network layer
LLC sublayer of the Data Link layer
MAC sublayer of the Data Link layer
MAC sublayer of the Data Link layer *
In which type of attack do attackers intercept the transmissions of two communicating nodes without the user’s knowledge?
Question 4 options:
brute force
rogue device
wardriver
man-in-the-middle
man-in-the-middle *
Which of the following is a valid IPv6 address?
Question 5 options:
1080::8:800:200C:417A
5510:ABCD::34:1::2
24::5B1A::346C
5BA4:2391:0:0:4C3E
1080::8:800:200C:417A *
Which binary signaling technique uses a scheme in which zero voltage represents a 0 bit and the voltage for a 1 bit does not drop back to zero before the end of the bit period?
Question 6 options:
RTZ
polar NRZ
NRZ
polar RTZ
NRZ *
Which of the following is a reason that UDP is faster than TCP?
Question 7 options:
it doesn’t use port numbers
it doesn’t guarantee delivery
the header is smaller
it has a higher priority on the network
it doesn’t guarantee delivery *
To determine best path, routers use metrics such as the value of the first octet of the destination IP address.
Question 8 options:
True
False
False *
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred to as which of the following?
Question 9 options:
training period
profile monitoring
traffic normalizing
baseline scanning
training period *
Which of the following types of traffic does NOT travel through routers?
Question 10 options:
DNS zone transfers
network route information
ARP requests
SNMP status information
ARP requests *
Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?
Question 11 options:
DiD
IDPS
VPN
DMZ
IDPS *
The Fresnel zone is the dispersal pattern of waves as they travel from sending to receiving antennas.
Question 12 options:
True
False
False *
A hactivist can best be described as which of the following?
Question 13 options:
deface Web sites by leaving messages for their friends to read
an unskilled programmer that spreads malicious scripts
consider themselves seekers of knowledge
use DoS attacks on Web sites with which they disagree
use DoS attacks on Web sites with which they disagree *
Which type of scan has the FIN, PSH, and URG flags set?
Question 14 options:
SYN Scan
FIN scan
Xmas scan
Null scan
Xmas scan *
In which frequency range are you likely to find WLANs?
Question 15 options:
3-30 MHz
2.9-30 GHz
30-300 GHz
174-328 MHz
2.9-30 GHz *
Which of the following is NOT a suggested practice before using a newly configured wireless network?
Question 16 options:
change the manufacturer’s default key
change the administrator password
alter the default channel
use the default encryption method
use the default encryption method *
An NIDPS can tell you whether an attack attempt on the host was successful.
Question 17 options:
True
False
False *
Which of the following is the IPv6 loopback address?
Question 18 options:
::FFFF
000:000::
::1
1000:127:0:0:1
::1 *
Which of the following is true about ACLs on Cisco routers?
Question 19 options:
there is an implicit deny any statement at the end of the ACL
there is an explicit permit any statement at the beginning of the ACL
ACLs bound to an interface apply to inbound and outbound traffic by default
ACLs are processed in reverse order so place high priority statements last
there is an implicit deny any statement at the end of the ACL *
Why might you want to allow extra time for setting up the database in an anomaly-based system?
Question 20 options:
to add your own custom rule base
the installation procedure is usually complex and time consuming
to allow a baseline of data to be compiled
it requires special hardware that must be custom built
to allow a baseline of data to be compiled *