• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
Which of the following layers of the ISO/OSI model do packet filtering firewalls operate at?
A. Application layer
B. Session layer
C. Network layer
D. Presentation layer
C. Network layer
In the OSI/ISO model, at what level is SET (SECURE ELECTRONIC TRANSACTION PROTOCOL) provided?
A. Application
B. Network
C. Presentation
D. Session
A. Application
What is not at a hot spot?
Data and Staff
What is at a warm spot?
partially ready to go
What is a cold spot?
Building, power, cooling basic connections.
Checklist, structured walk-through, simulation, parallel, and full interruption are examples of
BCP Business Continuity Management
What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO
broadcast packet so it seems to have originated at the victim's system, in order to flood it with
REPLY packets?
A. SYN flood attack
B. Smurf attack
C. Ping of Dead Attack
D. Denial of Service (DOS) Attack
B. Smurf attack
What is ARP poisoning?
A. Flooding of a switched network
B. A denial of service that uses the DNS death ping
C. Turning of IP to MAC resolution
D. Inserting a bogus IP and MAC address in the ARP table
E. Modifying a DNS record
D. Inserting a bogus IP and MAC address in the ARP table
Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
A. Teardrop
B. Smurf
C. Ping of Death
D. SYN flood
E. SNMP Attack
A. Teardrop
Ping
A. Does not provide confidentiality.. all plain text
B. sends an ICMP to node to see if it is up
C. ICMP messages to trace a network route
D. listens on TCP port 23
B. sends an ICMP to node to see if it is up
Traceroute
A. Does not provide confidentiality.. all plain text
B. sends an ICMP to node to see if it is up
C. ICMP messages to trace a network route
D. listens on TCP port 23
C. ICMP messages to trace a network route
Telnet
A. Does not provide confidentiality.. all plain text
B. sends an ICMP to node to see if it is up
C. ICMP messages to trace a network route
D. listens on TCP port 23
listens on TCP port 23 .
Does not provide confidentiality.. all plain text
FTP
A. Uses port 20\21
B. does not have confidentiality
C. uses UDP port 69
D. is a replacement for telnet
A. Uses port 20\21
B. does not have confidentiality
C. uses UDP port 69
Network Cabling is which layer
layer 1
Repeaters and hubs are what layer
layer 1
Bridges and switches are what layer
layer 2
What is a switch
A bridge with more than two ports
routing protocols support which layer
layer 3 network
x
x