Quiz 1 Flashcards

1
Q

What is encapsulation?

Adding a header and footer to data as it moves down the
OSI stack

Verifying a person’s identity

Protecting evidence until it has been properly collected

Changing the source and destination addresses of a packet

A

Adding a header and footer to data as it moves down the OSI stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which OSI model layer manages communications in
simplex, half-duplex, and full-duplex modes?
Session
Application
Transport
Physical

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A large table includes multiple subjects and objects. It
identifies the specific access each subject has to different
objects. What is this table called?
Access control matrix
Federation
Creeping privilege
Federated identity management

A

Access control matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access control mechanisms include which of the
following?
Logical, physical, and administrative controls
Management, operational, and technical controls
Corrective, recovery, and preventive controls
Directive, preventive, and detective control

A

Logical, physical, and administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which the following ags are used to establish a TCP connection? 
PSH
ACK
SYN
URG
FIN
A

ACK

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which option is not a LAN technology?
Ethernet 
Token Ring
Fiber Distributed Data Interface 
ATM
A

ATM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When using UDP, the TCP/IP transport layer is equivalent to the functions of only
the …………………… of the OSI model.
Transport
Transport, Session
Transport, Session, Application
Session, Presentation, Application

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which one is not a protocol in application layer? 
SRPC
SET
SMTP
IPSec
A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

…………………….accepts packets from the Network layer and converts
them into the proper format of ……………………. for transmission
Data Link, Segment
Data Link, Frame
Transport, Frame
Transport, Packet

A

Data Link, Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
which is not a Network hardware device that function at Layer 1?
NIC
hubs
concentrators
bridge
A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Used to resolve  MAC addresses into IP addresses
ARP
RARP
DNS
NAT
A

RARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
..................................records all activity that has been passed or blocked by the
rewall
Firewall log 
System Log
Change log 
network log
A

Firewall log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HIDS are more costly to manage than NIDS.

True/False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
To establish a TCP session, we are using the TCP 3-way handshake. What is the
correct order of the handshake?
SYN/ACK > ACK > SYN.
SYN > ACK > ACK.
SYN > SYN/ACK > ACK.
SYN > SYN/ACK > SYN
A

SYN > SYN/ACK > ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
An IPv4 address consists of how many bytes?
32
128
8
4
A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You get stopped on the way to your office by the CEO. She wants to talk to you because
you are one of those IT people. The CEO is wanting us to implement VoIP and has
heard it uses the User Datagram Protocol (UDP). On which layer of the Open Systems
Interconnection model (OSI model) would we find the UDP protocol?
1
3
4
2

A

4

17
Q

Which of the following is a form of denial of service attack that uses
spoofed ICMP packets to flood a victim with echo requests using a
bounce/amplification network?
smurf
Fraggle
Man in the Middle
Spam

A

smurf

18
Q
What is Kerberos?
Access-oriented protection system
Ticket-oriented protection system
List-oriented protection system
Lock-and-key-oriented protection system
A

Ticket-oriented protection system

19
Q
Intrusion detection systems cannot do which of the following?
Report alterations to data les
Trace user activity
Compensate for weak authentication
Interpret system logs
A

Compensate for weak authentication

20
Q
What is impersonating a user or system called?
snooping attack 
spoofing attack 
sniffing 
spamming
A

spoofing attack

21
Q

Source/Destination verification on routers is a technique used as a countermeasure
against ……………………. attack.
spoofing
spamming
DDoS
Sniffer

A

spoofing

22
Q
Packet delay and lost packets can be a sign of ....... attack.
sniffer
spamming 
spoofing 
fraggle
A

sniffer

23
Q
In Kerberos, the \_\_\_\_\_\_\_\_ is an encrypted session key that only the verfier can
decrypt.
ticket granting ticket
service ticket
Both A and B
Neither A nor B
A

service ticket

24
Q
IPsec operates at the \_\_\_\_\_\_\_\_ layer.
application
data link
internet
transport
A

internet

25
Q
review of recordings captured by security cameras is a ...................... access control 
Deterrent 
Detective 
Preventive 
Recovery
A

Detective

26
Q

A ……………………. access control confine, or control the actions of subjects to force or
encourage compliance with security policies
Directive
Detective
Compensation
Preventive

A

Directive

27
Q

Firewalls is considered to be technical access control. (True/False)

A

True

28
Q
Which option is not a step in the process of accountability. 
Authentication 
Authorization 
Auditing 
Availability
A

Availability

29
Q

the process of ………………………………..ensures that the requested activity or object
access is possible given the rights and privileges assigned to the authenticated
identity

authentication
authorization
identification
integration

A

authorization

30
Q

Cryptographic authentication systems must specify how the cryptographic
algorithms will be used. Which of the following authentication systems would
reduce the risk of impersonation in an environment of networked computer
systems?

Kerberos based authentication system
Password based authentication system
Memory token based authentication system
Smart token based authentication system

A

Kerberos based authentication system

31
Q
Which of the following security services can Kerberos best provide?
Authentication
Confidentiality
Integrity 
Availability
A

Authentication

32
Q
which access control relies upon the use of classification labels?
MAC
DAC
RBAC
TBAC
A

MAC

33
Q

Lattice-based access controls dene upper and lower bounds of access for every
relationship between a subject and an object
(True False)

A

true

34
Q

which type of access control does not have single point of failure?
centralized access control
decentralized access control

A

decentralized access control

35
Q

Non discretionary access control type has a central authority that
determine to what objects the subjects have access to and it is based
on role or on the organizational security policy.
(TrueFalse)

A

True