StudyGuide2_448 Flashcards

Exam2

1
Q

___ is the lowest layer in TCP/IP hierarchy

A
  • Link layer (network access)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is the term applied to basic unit of data that passes through link layer

A
  • Data frames
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(T/F) TCP is a connectionless protocol?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is the second lowest layer in the TCP/IP hierarchy

A
  • Internet (from host to server)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(T/F) IP is a connection-oriented protocol?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is transport layer with TCP/IP

A

Transmission Control Protocol(TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__ enables the receiving TCP/Ip stack to reconstruct the data stream at the destination in correct order

A

Sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ and __________ are two transport layer protocols within TCP/IP

A
  • TCP and UDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is the top layer of the TCP/IP stack

A
  • Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List three physical layer protocols

A

1) Ethernet
2) Fiber optic
3) Wi-Fi (IEEE 802.11),
4) DSl
5) ETC…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If a network interface is place in _________ mode, it will receive all the network traffic irrespective of source destination

A
  • promiscuous
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________ and _______ are two address types that corresponds to a networked computer

A
  • Mac and IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____________ is the protocol that resolves IP address into MAC ID’s

A
  • ARP (address resolution protocol)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the following Teardrop attack:
hacker.net 22 > target.org 33: UDP (frag 123:64@0++)
hacker.net 22 > target.org (frag 123:20@24)

A

The first packet has number 123 with data size 64 and starting offset 0, and ++ suggest oversize or manipulated to overlap with the next fragment.

The second packet is also 123 with 20 byte size and starting offset of 24 bytes.

Therefor the overlapping offset in the packets cause the target to attempt to reassemble themselves incorrectly and lead to potential system crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a Smurf attack which of the two Ip addresses are spoofed?
a) Source
b) destination

A

Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the procedure used to establish a TCP/IP connection between two host

A

3 way handshake

17
Q

________ Spoofing occurs when the attacker’s computer is on the same subnet as the victim

A
  • Non-blind (TCP)
18
Q

_______ spoofing occurs when the attack must guess the victim TCP layer generate Sequence number

A
  • Blind (TCP)
19
Q

______ attack employ spoofing to intercept network traffic and/or take over network session

A
  • Denial of service (DOS)
  • Man In the Middle (MITM)
20
Q

_____ compromise an operating system kernel

A
  • Kernel model rootkits
21
Q

If we describe the complexity of a string as R**L, where R is the radix of the symbol set and L is the length of the passwords string, in most practical situation increasing __ adds more security than increasing __

A
  • Length(L) than radix (R)
22
Q

The fact that HTTP is ___ requires that storage of transaction information to create online shopping carts

A
  • Stateless
23
Q

____ is an HTML image tag occurring within a web page that may result in malicious activity

A
  • Web bug
24
Q

List three types of information that may be harvested by the means of web bugs

A

1) IP address of computer users
2) Data and time of page view
3) Browser type and monitor resolution

25
Q

List three types of social engineering that are used to mislead or defraud computer and network users

A

1) Phishing
2) Email spoofing
3) Keystroke loggers

26
Q

List four types of viruses that infect computer systems

A

1) boot virus
2) file virus
3) macro virus
4) script virus

27
Q

_____ are two types of malwares that create a mechanism by means of which an attacker can remotely access and control the victim’s computer

A
  • Trojans and backdoors
28
Q

________ is a type of encryption where the encryption and decrypting keys are either the same or algorithmically related:

A
  • Symmetric encryption
29
Q

______ is a type of encryption where the encryption and decrypting keys are different: one is published and the other is secret

A
  • Asymmetric encryption
30
Q

______ is an information system resource whose values lies in an unauthorized of illicit use of that resource

A
  • Honeypot
31
Q
A