• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
A rabbit is what type of attack?
Denial of service.
What can you do to absolutely protect yourself from someone compromising your security?
There's nothing you can do.
The weakest link in security is which of the following?
The human being.
The network address for a machine whose IP address is 10.4.21.105 and net mask is 255.255.0.0 is which of the following?
10.4.0.0
What is the decimal equivalent of the hexadecimal value bd?
189.
What is the binary equivalent of the decimal value 204?
11001100.
What does a packet sniffer do?
Allows a user to view all the packets transmitted on the local subnet.
Which of the following can view a packet's data when it is sent over the internet?
Any machine on a subnet the packet must travel through to get from the sending machine to the receiving machine.
IP spoofing is the act of which of the following?
Transmitting packets with a forged source IP address.
What happens when a server's TCP backlog fills up with half-open connections?
The server stops accepting new connections.
The main task of a firewall is to do which of the following?
Filter packets based on source IP address, filter packets based on destination IP address, filter packets based on source parts, filter packets based on destination port.
When can a firewall protect against IP spoofing attacks?
When there is a small finite number of subnets behind it.
True or False.

A machine with no important or sensitive information stored on it has no need for security.
False.
What are acts that a hacker can commit after compromising the security of a computer system?
Delete the contents of the hard disk, modify data, use this machine to gain access to other machines.
A buffer overflow is what type of attack?
Bug.