Week2 MCQ Tfanswers - Week 2 answers (CSEC102) PDF

Title Week2 MCQ Tfanswers - Week 2 answers (CSEC102)
Course Fundamentals of Computing Security
Institution Rochester Institute of Technology
Pages 7
File Size 162.4 KB
File Type PDF
Total Downloads 5
Total Views 134

Summary

Week 2 answers (CSEC102)...


Description

CSEC 102- Information Assurance and Security Rochester Institute of Technology -RIT Dubai Campus FALL 2020

Week 2: Discuss Discussion ion Que Questions stions (NOT GRA GRADED) DED) Multiple-Choice Questions 1. Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working? A. Application B. Presentation C. Session D. Data Link 2. What type of network connects systems over the largest geographic area? A. Wide area network (WAN) B. Metropolitan area network (MAN) C. Local area network (LAN) D. Storage area network (SAN) 3. What type of network device normally connects directly to endpoints and uses MACbased filtering to limit traffic flows? A. Router B. Hub C. Access point D. Switch

4. Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues? A. Firewall B. Hub C. Switch D. Router

5. Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use? A. Firewall B. Virtual LAN (VLAN) C. Virtual private network (VPN) D. Transport Layer Security (TLS) 6. What is the maximum value for any octet in an IPv4 IP address? A. 65 B. 129 C. 255 D. 513 7. What protocol is responsible for assigning IP addresses to hosts on most networks? A. Dynamic Host Configuration Protocol (DHCP) B. Transport Layer Security (TLS) C. Virtual LAN (VLAN) D. Simple Mail Transfer Protocol (SMTP)

8. Henry is creating a firewall rule that will allow inbound mail to the organization. What TCP port must he allow through the firewall? A. 22 B. 25 C. 53 D. 80 9. Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication? A. 80 B. 143 C. 443 D. 3389 10. Henry's last firewall rule must allow inbound access to a Windows Terminal Server. What port must he allow?

A. 143 B. 443 C. 989 D. 3389 11. Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place? A. Teardrop B. Land C. Smurf D. Cross-site scripting (XSS) 12. What type of firewall security feature limits the volume of traffic from individual hosts? A. Loop protection B. Network separation C. Stateful inspection D. Flood guard

13. Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used? A. Packet filtering B. Application proxying C. Stateful inspection D. Network address translation 14. What firewall approach is shown in the figure?

A. Border firewall B. Bastion host C. Screened subnet D. Multilayered firewall

15. What is NOT a service commonly offered by unified threat management (UTM) devices? A. URL filtering B. Wireless network access C. Malware inspection D. Content inspection 16. Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use? A. Firewall B. Unified threat management (UTM) C. Router D. VPN concentrator 17. What wireless security technology contains significant flaws and should never be used?

A. Wired Equivalent Privacy (WEP) B. Wi-Fi Protected Access (WPA) C. WPA2 D. Remote Authentication Dial-In User Service (RADIUS) True/False Questions 1. The OSI Reference Model is a theoretical model of networking with interchangeable layers. A. True B. False 2. The Transport Layer of the OSI Reference Model creates, maintains, and disconnects communications that take place between processes over the network. A. True B. False 3. The Physical Layer of the OSI Reference Model must translate the binary ones and zeros of computer language into the language of the transport medium. A. True B. False 4. IP addresses are eight-byte addresses that uniquely identify every device on the network. A. True B. False 5. A packet-filtering firewall remembers information about the status of a network communication. A. True B. False 6. Another name for a border firewall is a DMZ firewall. A. True B. False

7. Internet Control Message Protocol (ICMP) is a method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address. A. True B. False

8. The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them. A. True B. False 9. The Data Link Layer of the OSI Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN). A. True B. False 10. A border router can provide enhanced features to internal networks and help keep subnet traffic separate. A. True B. False 11. TCP/IP is a suite of protocols that operates at both the Network and Transport layers of the OSI Reference Model. A. True B. False 12. A subnet mask is a partition of a network based on IP addresses. A. True B. False 13. The three main categories of network security risk are reconnaissance, eavesdropping, and denial of service. A. True B. False

14. A network attacker wants to know IP addresses used on a network, remote access procedures, and weaknesses in network systems. A. True B. False 15. A firewall is a basic network security defense tool. A. True B. False 20. A wireless access point (WAP) is the connection between a wired and wireless network. A. True B. False...


Similar Free PDFs