option
Questions
ayuda
daypo
search.php

Network Security Quiz

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Network Security Quiz

Description:
Network Security

Creation Date: 2012/03/27

Category: Computers

Number of questions: 48

Rating:(8)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Layer 5 of the OSI model is the ____ layer. Data Link. Network. Session. Presentation.

Layer 3 of the OSI model is the ____ layer. Network. Data Link. Session. Presentation.

A ____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment. Firewall. Hub. Router. Switch.

A ____ is a network device that can forward packets across computer networks. Router. Firewall. Bridge. Switch.

____ is a technology that can help to evenly distrubute work acroos a network. Stateful Packet Filtering. DNS Caching. DNS Poisoning. Load Balancing.

A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user. VPN Server. Telnet Server. Proxy Server. DNS Server.

A(n) ____ encrypts all data that is transmitted between the remote device and the network. IKE Tunnel. Router. VPN Tunnel. Endpoint.

A basic level of security can be achieved through using the security features found in network hardware. True. False.

Workgroup switches must work faster than core switches. True. False.

The key to the OSI reference model is ______.

NAT replaces a private IP address with a(n) _____ IP address.

Match: NAT. VLAN. Baseline. DMZ. OSI model. Remote Access. PAT. HIDS. Subnet Addressing.

The most common protocol suite used today for local area networks (LANs) as well as the internet is ____. UDP. BER. ASN.1. TCP/IP.

TCP is the main ____ protocol that is responsible for establishing connections and the reliable data transport between devices. Transport Layer. Network Layer. Presentation Layer. Application Layer.

SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device. entity. community string. MIB. OID.

DNS poisoning can be prevented by using the latest edition of the DNS software known as ____. Finger. WINS. BIND. DHCP.

A ____ forwards packets across computer networks. Switch. Router. Bridge. Hub.

A ____ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack. Flood guard. Protocol guard. link guard. frame guard.

____ can be used to determine whether a new IP addresses are attempting to probe the network. DNS Logs. DHCP Logs. Firewall Logs. Proxy Logs.

TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission. True. False.

TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application. True. False.

The ____ Layer is omitted in the TCP/IP model.

A(n) ____ is a record of events that occur.

Match. Network discovery. SNMP. DNS Poisoning. IP Telephony. Ping of Death. DNS. ICMP. STA. Smurf DoS attack.

The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications. Bluetooth v2.1. Bluetooth v1.2. Bluetooth v1.0. Bluetooth v1.1.

A group of piconets in which connections exist between different piconets is called a ____. Scatternet. Honeynet. Broadnet. Boundnet.

A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. Random. Sanctioned. Rogue. Legitimate.

____ is designed to detect any changes in a packet, whether accidental or intentional. CBC. CRC. AES. TKIP.

____ is a framework for transporting authentication protocols instead of the authentication protocol itself. PEAP. TKIP. SSL. EAP.

A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses. ICMP. TKIP. EAP. RADIUS.

____ allow a single access point to service different types of users. Wireless VPNs. Wireless encryption standards. Wireless multimedia protocols. Wireless VLANs.

Bluetooth devices are not backward compatible with previous versions. True. False.

Because of the weakness of WEP, it is possible for an attacker to identify two packets from the same IV. True. False.

When a wireless device looks for beacon frames it is known as ____.

When using IEEE 802.1x authentication, ____ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.

Match: TKIP. Protected EAP. Evil Twin. War Chalking. Lightweight EAP. Initialization Vector. SSID. Bluetooth. War Driving.

A user or a process functioning on behalf of the user that attempts to access an object is known as the ____. Subject. reference monitor. entity. Label.

A(n) ____ model is a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications. Accounting. user control. access control. authorization control.

In the UAC dialog boxes, the color ____ indicates the lowest risk. Red. Gray. Yellow. Green.

____ is considered a more “real world” access control than the other models because the access is based on a user’s job function within an organization. Role Based Access Control. Rule Based Access Control. Discretionary Access Control. Mandatory Access Control.

A user under Role Based Access Control can be assigned only one ____. Role. Group. Label. access list.

A(n) ____ is a set of permissions that are attached to an object. ACE. DAC. Entity. ACL.

____ indicates when an account is no longer active. Password expiration. Account expiration. Last login. Account last used.

Authorization and access are viewed as synonymous and in access control, they are the same step. True. False.

A shield icon warns users if they attempt to access any feature that requires UAC permission. True. False.

__ is granting or denying approval to use specific resources.

In the DAC model, ______ can create and access their objects freely.

Match: Access. End User. Authorization. Owner. Authentication. Object. Directory Service. Identification. Custodian.

Report abuse