Vous êtes sur la page 1sur 6

User Laura Stamps Course (2011FS) Networking Essentials (402FS) Noon Test Quiz 12 Started 11/6/11 10:07 PM Submitted

11/8/11 7:27 PM Status Completed Score 50 out of 50 points Time Elapsed 48 minutes out of 1 hour. Instructions
false

Question 1 2 out of 2 points A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. Answer Selected Answer: Correct Answer: Question 2 2 out of 2 points proxy service proxy service

____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm. Answer Selected Answer: Correct Answer: Question 3 2 out of 2 points Encryption Encryption

A(n) ____ is a password-protected and encrypted file that holds an individuals identification information, including a public key. Answer Selected Answer: digital certificate Correct Answer: digital certificate Question 4 2 out of 2 points In general, information is ____________________ if it could be used by other parties to impair an organizations functioning, decrease customers confidence, cause a financial

loss, damage an organizations status, or give a significant advantage to a competitor. Answer Selected Answer: Correct Answer: Question 5 2 out of 2 points confidential confidential

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination. Answer Selected Answer: packet-filtering Correct Answer: packet-filtering Question 6 2 out of 2 points A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised. Answer Selected Answer: Correct Answer: Question 7 2 out of 2 points security audit security audit

RADIUS and TACACS belong to a category of protocols known as AAA (____). Answer Selected Answer: authentication, authorization, and accounting Correct Answer: authentication, authorization, and accounting Question 8 5 out of 5 points Describe the two phases IPSec use to accomplish authentication. Answer Selected Answer: There are two phases in IPSec Authentication. First is Key management which refers to the way two nodes agree on common parameters for the keys that will be used. IKE is used for key management. As IPSecs and IKE are evolving standards, interopability between different vendors is still a problem. IKE runs on UDP and after it creates the rules the two nodes will

use. Then the second phse begins which is encryption. Second is encryption AH and ESP may be used to encypt the keys. Correct Answer: IPSec accomplishes authentication in two phases. The first phase is key management, and the second phase is encryption. Key management refers to the way in which two nodes agree on common parameters for the keys they will use. IPSec relies on IKE (Internet Key Exchange) for its key management. IKE is a service that runs on UDP port 500. After IKE has established the rules for the type of keys two nodes will use, IPSec invokes its second phase, encryption. In this phase, two types of encryption may be used: AH (authentication header) and ESP (Encapsulating Security Payload). [None Given]

Response Feedback: Question 9 2 out of 2 points

____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information. Answer Selected Answer: Phishing Correct Answer: Phishing Question 10 2 out of 2 points In ____, both computers verify the credentials of the other. Answer Selected Answer: mutual authorization Correct Answer: mutual authentication Question 11 5 out of 5 points Define SSH (secure shell) and explain threats it guards against. Include an explanation of the encryption algorithms that may be used with it. Answer Selected Answer: Secured shell is a collection of protocols; which you can securelylog on, execute commands and copy files to and from that host. You are secure

from many threas such as: IP Spoofing, interception of your data, or unauthorized access to ahost, and DNS spoofingwhich means the hackers can not pretend to be someone they really are not. The software it uses depends on what version you are usng. Examples would be RSA, DES, triple DES, Kerberos Correct Answer: SSH (Secure Shell) is a collection of protocols that does both. With SSH, you can securely log on to a host, execute commands on that host, and copy files to or from that host. SSH encrypts data exchanged throughout the session. It guards against a number of security threats, including unauthorized access to a host, IP spoofing, interception of data in transit (even if it must be transferred via intermediate hosts), and DNS spoofing, in which a hacker forges name server records to falsify his hosts identity. Depending on the version, SSH may use DES, Triple DES, RSA, Kerberos, or another, less common encryption algorithm or method. [None Given]

Response Feedback: Question 12 2 out of 2 points

In ____ , a hacker forges name server records to falsify his hosts identity. Answer Selected Answer: DNS spoofing Correct Answer: DNS spoofing Question 13 2 out of 2 points An NOS that contains a back dooris an example of a risk associated with ____. Answer Selected Answer: protocols and software Correct Answer: protocols and software Question 14 2 out of 2 points A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted. Answer

Selected Answer: denial-of-service Correct Answer: denial-of-service Question 15 2 out of 2 points ____ software searches a node for open ports. Answer Selected Answer: Port scanner Correct Answer: Port scanner Question 16 2 out of 2 points A(n) ____________________ identifies an organizations security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee. Answer Selected Answer: Correct Answer: Question 17 2 out of 2 points security policy security policy

A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data. Answer Selected Answer: brute force Correct Answer: brute force Question 18 10 out of 10 points Match each item with a statement below: Answer Question A firewall that can view a data stream. Correct Match E. Selected Match E.

stateful A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. Software that can only detect and log suspicious activity. A firewall that protects only the computer on which it is installed. Data is encrypted using two keys. G. proxy service B. IDS D. host-based H. public key encryption C. content filtering A. IPS I. private key encryption F. proxy server

stateful G. proxy service B. IDS D. host-based H. public key encryption C. content filtering A. IPS I. private key encryption F. proxy server

A firewall that can block designated types of traffic based on application data contained within packets. Software that can react to suspicious activity. Data is encrypted using a single key.

The host that runs the proxy service. Monday, November 14, 2011 3:16:32 PM EST

Vous aimerez peut-être aussi