2.8. Review Questions

  1. Firewalls provide security through what mechanism?

    1. Watching for intrusions

    2. Controlling traffic entering and leaving a network

    3. Requiring strong passwords

    4. Preventing misuse of company resources

  2. A switch can be used to prevent broadcast storms between connected systems through the use of what?

    1. SSL

    2. S/MIME

    3. VLANs

    4. LDAP

  3. Which form of cable media is least vulnerable to eavesdropping?

    1. Fiber optic

    2. STP

    3. Coax

    4. Wireless

  4. What is a blind FTP site?

    1. A site where users don't authenticate

    2. A site where all traffic is encrypted

    3. A site where only anonymous access is allowed

    4. A site where users can upload but not download

  5. Which of the following allows the deployment of a publicly accessible web server without compromising the security of the private network?

    1. Intranet

    2. DMZ

    3. Extranet

    4. Switch

  6. Which of the following is not one of the IP address ranges reserved for private use by RFC 1918?

    1. 10.0.0.0–10.255.255.255

    2. 192.168.0.0–192.168.255.255

    3. 169.254.0.0–169.254.255.255

    4. 172.16.0.0–172.31.255.255

  7. A network-based IDS is not suitable for detecting or protecting against which of the following?

    1. E-mail spoofing

    2. Denial-of-service attacks

    3. Attacks against the network

    4. Attacks against an environment that produce significant traffic

  8. What tool is used to lure or retain intruders in order to gather sufficient evidence without compromising the security of the private network?

    1. Firewall

    2. IDS

    3. Router

    4. Honeypot

  9. Which of the following is a denial-of-service attack that uses network packets that have been spoofed so that the source and destination address are that of the victim?

    1. Land

    2. Teardrop

    3. Smurf

    4. Fraggle

  10. What is the purpose of a site survey?

    1. Improve wireless signal strength

    2. Eliminate unwanted access locations

    3. Distribute WEP keys

    4. Plan the design of a wired network

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.106.32