Quiz 1 Flashcards
What is encapsulation?
Adding a header and footer to data as it moves down the
OSI stack
Verifying a person’s identity
Protecting evidence until it has been properly collected
Changing the source and destination addresses of a packet
Adding a header and footer to data as it moves down the OSI stack
Which OSI model layer manages communications in
simplex, half-duplex, and full-duplex modes?
Session
Application
Transport
Physical
Session
A large table includes multiple subjects and objects. It
identifies the specific access each subject has to different
objects. What is this table called?
Access control matrix
Federation
Creeping privilege
Federated identity management
Access control matrix
Access control mechanisms include which of the
following?
Logical, physical, and administrative controls
Management, operational, and technical controls
Corrective, recovery, and preventive controls
Directive, preventive, and detective control
Logical, physical, and administrative controls
Which the following ags are used to establish a TCP connection? PSH ACK SYN URG FIN
ACK
SYN
Which option is not a LAN technology? Ethernet Token Ring Fiber Distributed Data Interface ATM
ATM
When using UDP, the TCP/IP transport layer is equivalent to the functions of only
the …………………… of the OSI model.
Transport
Transport, Session
Transport, Session, Application
Session, Presentation, Application
Transport
Which one is not a protocol in application layer? SRPC SET SMTP IPSec
IPSec
…………………….accepts packets from the Network layer and converts
them into the proper format of ……………………. for transmission
Data Link, Segment
Data Link, Frame
Transport, Frame
Transport, Packet
Data Link, Frame
which is not a Network hardware device that function at Layer 1? NIC hubs concentrators bridge
bridge
Used to resolve MAC addresses into IP addresses ARP RARP DNS NAT
RARP
..................................records all activity that has been passed or blocked by the rewall Firewall log System Log Change log network log
Firewall log
HIDS are more costly to manage than NIDS.
True/False
True
To establish a TCP session, we are using the TCP 3-way handshake. What is the correct order of the handshake? SYN/ACK > ACK > SYN. SYN > ACK > ACK. SYN > SYN/ACK > ACK. SYN > SYN/ACK > SYN
SYN > SYN/ACK > ACK
An IPv4 address consists of how many bytes? 32 128 8 4
4
You get stopped on the way to your office by the CEO. She wants to talk to you because
you are one of those IT people. The CEO is wanting us to implement VoIP and has
heard it uses the User Datagram Protocol (UDP). On which layer of the Open Systems
Interconnection model (OSI model) would we find the UDP protocol?
1
3
4
2
4
Which of the following is a form of denial of service attack that uses
spoofed ICMP packets to flood a victim with echo requests using a
bounce/amplification network?
smurf
Fraggle
Man in the Middle
Spam
smurf
What is Kerberos? Access-oriented protection system Ticket-oriented protection system List-oriented protection system Lock-and-key-oriented protection system
Ticket-oriented protection system
Intrusion detection systems cannot do which of the following? Report alterations to data les Trace user activity Compensate for weak authentication Interpret system logs
Compensate for weak authentication
What is impersonating a user or system called? snooping attack spoofing attack sniffing spamming
spoofing attack
Source/Destination verification on routers is a technique used as a countermeasure
against ……………………. attack.
spoofing
spamming
DDoS
Sniffer
spoofing
Packet delay and lost packets can be a sign of ....... attack. sniffer spamming spoofing fraggle
sniffer
In Kerberos, the \_\_\_\_\_\_\_\_ is an encrypted session key that only the verfier can decrypt. ticket granting ticket service ticket Both A and B Neither A nor B
service ticket
IPsec operates at the \_\_\_\_\_\_\_\_ layer. application data link internet transport
internet