Quiz 1 Flashcards

1
Q

What is encapsulation?

Adding a header and footer to data as it moves down the
OSI stack

Verifying a person’s identity

Protecting evidence until it has been properly collected

Changing the source and destination addresses of a packet

A

Adding a header and footer to data as it moves down the OSI stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which OSI model layer manages communications in
simplex, half-duplex, and full-duplex modes?
Session
Application
Transport
Physical

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A large table includes multiple subjects and objects. It
identifies the specific access each subject has to different
objects. What is this table called?
Access control matrix
Federation
Creeping privilege
Federated identity management

A

Access control matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access control mechanisms include which of the
following?
Logical, physical, and administrative controls
Management, operational, and technical controls
Corrective, recovery, and preventive controls
Directive, preventive, and detective control

A

Logical, physical, and administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which the following ags are used to establish a TCP connection? 
PSH
ACK
SYN
URG
FIN
A

ACK

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which option is not a LAN technology?
Ethernet 
Token Ring
Fiber Distributed Data Interface 
ATM
A

ATM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When using UDP, the TCP/IP transport layer is equivalent to the functions of only
the …………………… of the OSI model.
Transport
Transport, Session
Transport, Session, Application
Session, Presentation, Application

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which one is not a protocol in application layer? 
SRPC
SET
SMTP
IPSec
A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

…………………….accepts packets from the Network layer and converts
them into the proper format of ……………………. for transmission
Data Link, Segment
Data Link, Frame
Transport, Frame
Transport, Packet

A

Data Link, Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
which is not a Network hardware device that function at Layer 1?
NIC
hubs
concentrators
bridge
A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Used to resolve  MAC addresses into IP addresses
ARP
RARP
DNS
NAT
A

RARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
..................................records all activity that has been passed or blocked by the
rewall
Firewall log 
System Log
Change log 
network log
A

Firewall log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HIDS are more costly to manage than NIDS.

True/False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
To establish a TCP session, we are using the TCP 3-way handshake. What is the
correct order of the handshake?
SYN/ACK > ACK > SYN.
SYN > ACK > ACK.
SYN > SYN/ACK > ACK.
SYN > SYN/ACK > SYN
A

SYN > SYN/ACK > ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
An IPv4 address consists of how many bytes?
32
128
8
4
A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You get stopped on the way to your office by the CEO. She wants to talk to you because
you are one of those IT people. The CEO is wanting us to implement VoIP and has
heard it uses the User Datagram Protocol (UDP). On which layer of the Open Systems
Interconnection model (OSI model) would we find the UDP protocol?
1
3
4
2

17
Q

Which of the following is a form of denial of service attack that uses
spoofed ICMP packets to flood a victim with echo requests using a
bounce/amplification network?
smurf
Fraggle
Man in the Middle
Spam

18
Q
What is Kerberos?
Access-oriented protection system
Ticket-oriented protection system
List-oriented protection system
Lock-and-key-oriented protection system
A

Ticket-oriented protection system

19
Q
Intrusion detection systems cannot do which of the following?
Report alterations to data les
Trace user activity
Compensate for weak authentication
Interpret system logs
A

Compensate for weak authentication

20
Q
What is impersonating a user or system called?
snooping attack 
spoofing attack 
sniffing 
spamming
A

spoofing attack

21
Q

Source/Destination verification on routers is a technique used as a countermeasure
against ……………………. attack.
spoofing
spamming
DDoS
Sniffer

22
Q
Packet delay and lost packets can be a sign of ....... attack.
sniffer
spamming 
spoofing 
fraggle
23
Q
In Kerberos, the \_\_\_\_\_\_\_\_ is an encrypted session key that only the verfier can
decrypt.
ticket granting ticket
service ticket
Both A and B
Neither A nor B
A

service ticket

24
Q
IPsec operates at the \_\_\_\_\_\_\_\_ layer.
application
data link
internet
transport
25
``` review of recordings captured by security cameras is a ...................... access control Deterrent Detective Preventive Recovery ```
Detective
26
A ......................... access control confine, or control the actions of subjects to force or encourage compliance with security policies Directive Detective Compensation Preventive
Directive
27
Firewalls is considered to be technical access control. (True/False)
True
28
``` Which option is not a step in the process of accountability. Authentication Authorization Auditing Availability ```
Availability
29
the process of ......................................ensures that the requested activity or object access is possible given the rights and privileges assigned to the authenticated identity authentication authorization identification integration
authorization
30
Cryptographic authentication systems must specify how the cryptographic algorithms will be used. Which of the following authentication systems would reduce the risk of impersonation in an environment of networked computer systems? Kerberos based authentication system Password based authentication system Memory token based authentication system Smart token based authentication system
Kerberos based authentication system
31
``` Which of the following security services can Kerberos best provide? Authentication Confidentiality Integrity Availability ```
Authentication
32
``` which access control relies upon the use of classification labels? MAC DAC RBAC TBAC ```
MAC
33
Lattice-based access controls dene upper and lower bounds of access for every relationship between a subject and an object (True False)
true
34
which type of access control does not have single point of failure? centralized access control decentralized access control
decentralized access control
35
Non discretionary access control type has a central authority that determine to what objects the subjects have access to and it is based on role or on the organizational security policy. (TrueFalse)
True