TCP/IP IPv6 and IPv4

Computing

Quiz 12 :

Securing Tcp/Ip Environments

Quiz 12 :

Securing Tcp/Ip Environments

Question Type
search
arrow
Which of the following reveals a system vulnerability and is often documented, either by the manufacturer or by an attacker?
Free
Multiple Choice
Answer:

Answer:

B

Tags
Choose question tag
close menu
arrow
Which of the following is a specially "hardened" software service or software/hardware product that erects a barrier to inspect and control traffic flow between networks?
Free
Multiple Choice
Answer:

Answer:

A

Tags
Choose question tag
close menu
arrow
Which of the following is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities?
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
Which of the following terms is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following is a weak spot or known place of attack on any common operating system, application, or service?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
In which of the following attacks is the attacker able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Fundamental protocols-including IP and TCP or UDP-offer no built-in security controls.
True False
Answer:
Tags
Choose question tag
close menu
arrow
When users from outside the network attach to a service inside the network, they actually attach to the proxy server, which establishes a proxy session into the private side of the network from there.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following is an undocumented and illicit point of entry into an operating system or application added by a system's programmers to bypass normal security?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following terms means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following software programs can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Strictly speaking, VPNs use tunneling protocols; therefore, they need to encrypt tunneled traffic.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which type of attack includes SYN Flood, broadcast amplification attacks, and buffer overflow?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A stealthy attacker may cover its tracks by deleting log files, or terminating any active direct connections. Indicate the answer choice that best completes the statement or answers the question.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which type of device makes access control decisions on the basis of application content rather than by looking at IP addresses or port numbers and can act on a host to deny potentially malicious activity?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following refers to a successful attempt to compromise a system's security?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following types of attacks serves the purpose of masquerading as an authorized user in order to gain access to a system?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following serves the purpose of finding out what you have and what is vulnerable?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Proxy server software permits internal network addresses to be "translated" into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet.
True False
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 50