Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
19 Cards in this Set
- Front
- Back
Which of the following layers of the ISO/OSI model do packet filtering firewalls operate at?
A. Application layer B. Session layer C. Network layer D. Presentation layer |
C. Network layer
|
|
In the OSI/ISO model, at what level is SET (SECURE ELECTRONIC TRANSACTION PROTOCOL) provided?
A. Application B. Network C. Presentation D. Session |
A. Application
|
|
What is not at a hot spot?
|
Data and Staff
|
|
What is at a warm spot?
|
partially ready to go
|
|
What is a cold spot?
|
Building, power, cooling basic connections.
|
|
Checklist, structured walk-through, simulation, parallel, and full interruption are examples of
|
BCP Business Continuity Management
|
|
What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO
broadcast packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets? A. SYN flood attack B. Smurf attack C. Ping of Dead Attack D. Denial of Service (DOS) Attack |
B. Smurf attack
|
|
What is ARP poisoning?
A. Flooding of a switched network B. A denial of service that uses the DNS death ping C. Turning of IP to MAC resolution D. Inserting a bogus IP and MAC address in the ARP table E. Modifying a DNS record |
D. Inserting a bogus IP and MAC address in the ARP table
|
|
Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
A. Teardrop B. Smurf C. Ping of Death D. SYN flood E. SNMP Attack |
A. Teardrop
|
|
Ping
A. Does not provide confidentiality.. all plain text B. sends an ICMP to node to see if it is up C. ICMP messages to trace a network route D. listens on TCP port 23 |
B. sends an ICMP to node to see if it is up
|
|
Traceroute
A. Does not provide confidentiality.. all plain text B. sends an ICMP to node to see if it is up C. ICMP messages to trace a network route D. listens on TCP port 23 |
C. ICMP messages to trace a network route
|
|
Telnet
A. Does not provide confidentiality.. all plain text B. sends an ICMP to node to see if it is up C. ICMP messages to trace a network route D. listens on TCP port 23 |
listens on TCP port 23 .
Does not provide confidentiality.. all plain text |
|
FTP
A. Uses port 20\21 B. does not have confidentiality C. uses UDP port 69 D. is a replacement for telnet |
A. Uses port 20\21
B. does not have confidentiality C. uses UDP port 69 |
|
Network Cabling is which layer
|
layer 1
|
|
Repeaters and hubs are what layer
|
layer 1
|
|
Bridges and switches are what layer
|
layer 2
|
|
What is a switch
|
A bridge with more than two ports
|
|
routing protocols support which layer
|
layer 3 network
|
|
x
|
x
|