Test 2 Part 2NAME Larry Perkins
After answering the following questions, name your file:
LastName.FirstName.Test2Part2
and save your file in the correct folder on Blackhawk.
True/False
Indicate whether the statement is true or false.
T____1.Common network device vulnerabilities include weak passwords, default accounts, back doors, and privilege escalation.
T____2.Network devices are commonly protected by passwords to prevent unauthorized users from accessing the device and changing configuration settings.
F____3.DoS attacks are limited to wired networks and cannot be used against wireless networks.
T____4.TCP/IP hijacking is successful because several protocols, such as File Transfer Protocol (FTP) and Telnet, do not check the source IP addresses of the device from which they receive packets.
F____5.Passive wireless discovery through war driving in itself is an illegal activity.
T____6.Securing a network begins with the design of the network and includes secure network technologies.
F____7.Often the devices most vulnerable to attack are those that provide services to inside users.
T____8.As a packet leaves a network, NAT removes the private IP address from the sender’s packet and replaces it with an alias IP address.
F____9.Hardware firewalls usually are located inside the network security perimeter as the last line of defense.
T____10.Although hardware firewalls are considered the most secure, personal software firewalls have gradually improved their functionality.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
C____11.A(n) ____ is an account that is secretly set up without the administrator’s knowledge or permission, that cannot be easily detected, and that allows for remote access to the device.
a. / escalation account / c. / back doorb. / weak password / d. / default account
A____12.With wireless CSMA/CA, the amount of time that a device must wait after the medium is clear is called the ____.
a. / collision time / c. / clear timeb. / slot time / d. / tx time
C____13.____ specifies that before a networked device starts to send, it should first listen (called carrier sensing) to see if any other device is transmitting.
a. / CSMA/ACK / c. / CSMA/CDb. / CSMA/CA / d. / CSCD/MA
D____14.A(n) ____ attack makes a copy of the transmission before sending it to the recipient.
a. / man-in-the-middle / c. / DNS spoofingb. / replay / d. / ARP poisoning
A____15.The most common protocol suite used today for networks as well as the Internet is ____.
a. / TCP/IP / c. / SNMPb. / SMTP / d. / DNS
B____16.____ is a popular protocol used to manage network equipment.
a. / SMTP / c. / TCP/IPb. / IMAP / d. / SNMP
C____17.When TCP/IP was developed, the host table concept was expanded to a hierarchical name system known as the ____.
a. / ARPAnet / c. / SNMPb. / DNS / d. / SMTP
D____18.One approach to substituting a fraudulent IP address is to target the external DNS server and is called ____.
a. / DNS spoofing / c. / zone transferb. / DNS transfer / d. / DNS poisoning
D____19.In order for a host using TCP/IP on an Ethernet network to find the MAC address of another device, it uses ____.
a. / BIND / c. / ARPb. / MAC-DNS / d. / DNS
D____20.An attacker could alter the MAC address in the ARP cache so that the corresponding IP address would point to a different computer, which is known as ____.
a. / DNS spoofing / c. / ARP transferb. / DNS poisoning / d. / ARP poisoning
D____21.____ enables the attacker’s computer to forward any network traffic it receives from Computer A to the actual router.
a. / IP mirroring / c. / IP forwardingb. / Port mirroring / d. / Port forwarding
C____22.At regular intervals a wireless AP sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.
a. / beaconing / c. / mappingb. / scanning / d. / caching
B____23.Each wireless device looks for beacon frames in a process known as ____.
a. / mapping / c. / cachingb. / scanning / d. / beaconing
C____24.Wireless location mapping is the formal expression for ____.
a. / wireless scanning / c. / war drivingb. / wireless caching / d. / wireless beaconing
B____25.The most common type of antenna for war driving is an omnidirectional antenna, also known as a ____ antenna.
a. / bipole / c. / GPSb. / dipole / d. / tagging
A____26.____ is the name given to a wireless technology that uses short-range RF transmissions.
a. / Bluetooth / c. / Scatternetb. / Piconet / d. / Wi-fi
B____27.A group of piconets in which connections exist between different piconets is called a ____.
a. / shortnet / c. / multinetb. / meshnet / d. / scatternet
A____28.Using ____, networks can essentially be divided into three parts: network, subnet, and host.
a. / classful addressing / c. / stateful addressingb. / subnetting / d. / stateless addressing
B____29.____ switches are connected directly to the devices on the network.
a. / Workgroup / c. / Statelessb. / Core / d. / Stateful
A____30.____ IP addresses are not assigned to any specific user or organization; instead, they can be used by any user on the private internal network.
a. / Public / c. / DMZb. / Virtual / d. / Private
A____31.A variation of NAT is ____. Instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different TCP port number.
a. / PAT / c. / DATb. / CAT / d. / TAT
A____32.____ examines the current state of a system or network device before it is allowed to connect to the network.
a. / NAT / c. / VACb. / PAT / d. / NAC
C____33.The goal of ____ is to prevent computers with sub-optimal security from potentially infecting other computers through the network.
a. / subnetting / c. / NACb. / NAT / d. / PAT
A____34.The goal of a ____ is to hide the IP address of client systems inside the secure network.
a. / VLAN / c. / routerb. / switch / d. / proxy server
B____35.____ honeypots are used mainly by organizations to capture limited information regarding attacks on that organization’s honeypot.
a. / Virtual / c. / Productionb. / Research / d. / Clustered
C____36.A ____ watches for attempts to penetrate a network.
a. / SIDS / c. / NIDSb. / HIDS / d. / PIDS
C____37.A ____ is an instruction that interrupts the program being executed and requests a service from the operating system.
a. / system call / c. / kernel callb. / system command / d. / system module
D____38.____ work to protect the entire network and all devices that are connected to it.
a. / HIPS / c. / Reverse proxyb. / HIDS / d. / NIPS
A____39.____ are designed to inspect traffic, and based on their configuration or security policy, they can drop malicious traffic.
a. / NIDS / c. / NIPSb. / HIPS / d. / HIDS
D____40.____ monitor Internet traffic and block access to preselected Web sites and files.
a. / Protocol analyzers / c. / NIDSb. / Proxy servers / d. / Internet content filters