Test 2 Part 2NAME Larry Perkins

After answering the following questions, name your file:

LastName.FirstName.Test2Part2

and save your file in the correct folder on Blackhawk.

True/False

Indicate whether the statement is true or false.

T____1.Common network device vulnerabilities include weak passwords, default accounts, back doors, and privilege escalation.

T____2.Network devices are commonly protected by passwords to prevent unauthorized users from accessing the device and changing configuration settings.

F____3.DoS attacks are limited to wired networks and cannot be used against wireless networks.

T____4.TCP/IP hijacking is successful because several protocols, such as File Transfer Protocol (FTP) and Telnet, do not check the source IP addresses of the device from which they receive packets.

F____5.Passive wireless discovery through war driving in itself is an illegal activity.

T____6.Securing a network begins with the design of the network and includes secure network technologies.

F____7.Often the devices most vulnerable to attack are those that provide services to inside users.

T____8.As a packet leaves a network, NAT removes the private IP address from the sender’s packet and replaces it with an alias IP address.

F____9.Hardware firewalls usually are located inside the network security perimeter as the last line of defense.

T____10.Although hardware firewalls are considered the most secure, personal software firewalls have gradually improved their functionality.

Multiple Choice

Identify the choice that best completes the statement or answers the question.

C____11.A(n) ____ is an account that is secretly set up without the administrator’s knowledge or permission, that cannot be easily detected, and that allows for remote access to the device.

a. / escalation account / c. / back door
b. / weak password / d. / default account

A____12.With wireless CSMA/CA, the amount of time that a device must wait after the medium is clear is called the ____.

a. / collision time / c. / clear time
b. / slot time / d. / tx time

C____13.____ specifies that before a networked device starts to send, it should first listen (called carrier sensing) to see if any other device is transmitting.

a. / CSMA/ACK / c. / CSMA/CD
b. / CSMA/CA / d. / CSCD/MA

D____14.A(n) ____ attack makes a copy of the transmission before sending it to the recipient.

a. / man-in-the-middle / c. / DNS spoofing
b. / replay / d. / ARP poisoning

A____15.The most common protocol suite used today for networks as well as the Internet is ____.

a. / TCP/IP / c. / SNMP
b. / SMTP / d. / DNS

B____16.____ is a popular protocol used to manage network equipment.

a. / SMTP / c. / TCP/IP
b. / IMAP / d. / SNMP

C____17.When TCP/IP was developed, the host table concept was expanded to a hierarchical name system known as the ____.

a. / ARPAnet / c. / SNMP
b. / DNS / d. / SMTP

D____18.One approach to substituting a fraudulent IP address is to target the external DNS server and is called ____.

a. / DNS spoofing / c. / zone transfer
b. / DNS transfer / d. / DNS poisoning

D____19.In order for a host using TCP/IP on an Ethernet network to find the MAC address of another device, it uses ____.

a. / BIND / c. / ARP
b. / MAC-DNS / d. / DNS

D____20.An attacker could alter the MAC address in the ARP cache so that the corresponding IP address would point to a different computer, which is known as ____.

a. / DNS spoofing / c. / ARP transfer
b. / DNS poisoning / d. / ARP poisoning

D____21.____ enables the attacker’s computer to forward any network traffic it receives from Computer A to the actual router.

a. / IP mirroring / c. / IP forwarding
b. / Port mirroring / d. / Port forwarding

C____22.At regular intervals a wireless AP sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.

a. / beaconing / c. / mapping
b. / scanning / d. / caching

B____23.Each wireless device looks for beacon frames in a process known as ____.

a. / mapping / c. / caching
b. / scanning / d. / beaconing

C____24.Wireless location mapping is the formal expression for ____.

a. / wireless scanning / c. / war driving
b. / wireless caching / d. / wireless beaconing

B____25.The most common type of antenna for war driving is an omnidirectional antenna, also known as a ____ antenna.

a. / bipole / c. / GPS
b. / dipole / d. / tagging

A____26.____ is the name given to a wireless technology that uses short-range RF transmissions.

a. / Bluetooth / c. / Scatternet
b. / Piconet / d. / Wi-fi

B____27.A group of piconets in which connections exist between different piconets is called a ____.

a. / shortnet / c. / multinet
b. / meshnet / d. / scatternet

A____28.Using ____, networks can essentially be divided into three parts: network, subnet, and host.

a. / classful addressing / c. / stateful addressing
b. / subnetting / d. / stateless addressing

B____29.____ switches are connected directly to the devices on the network.

a. / Workgroup / c. / Stateless
b. / Core / d. / Stateful

A____30.____ IP addresses are not assigned to any specific user or organization; instead, they can be used by any user on the private internal network.

a. / Public / c. / DMZ
b. / Virtual / d. / Private

A____31.A variation of NAT is ____. Instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different TCP port number.

a. / PAT / c. / DAT
b. / CAT / d. / TAT

A____32.____ examines the current state of a system or network device before it is allowed to connect to the network.

a. / NAT / c. / VAC
b. / PAT / d. / NAC

C____33.The goal of ____ is to prevent computers with sub-optimal security from potentially infecting other computers through the network.

a. / subnetting / c. / NAC
b. / NAT / d. / PAT

A____34.The goal of a ____ is to hide the IP address of client systems inside the secure network.

a. / VLAN / c. / router
b. / switch / d. / proxy server

B____35.____ honeypots are used mainly by organizations to capture limited information regarding attacks on that organization’s honeypot.

a. / Virtual / c. / Production
b. / Research / d. / Clustered

C____36.A ____ watches for attempts to penetrate a network.

a. / SIDS / c. / NIDS
b. / HIDS / d. / PIDS

C____37.A ____ is an instruction that interrupts the program being executed and requests a service from the operating system.

a. / system call / c. / kernel call
b. / system command / d. / system module

D____38.____ work to protect the entire network and all devices that are connected to it.

a. / HIPS / c. / Reverse proxy
b. / HIDS / d. / NIPS

A____39.____ are designed to inspect traffic, and based on their configuration or security policy, they can drop malicious traffic.

a. / NIDS / c. / NIPS
b. / HIPS / d. / HIDS

D____40.____ monitor Internet traffic and block access to preselected Web sites and files.

a. / Protocol analyzers / c. / NIDS
b. / Proxy servers / d. / Internet content filters