Chapter 9 Exam - Chapter 9 - TCP/IP Security Exam Review of...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 9 - TCP/IP Security Exam Review of attempt 1 Started on Tuesday, July 19, 2011, 03:35 AM Completed on Tuesday, July 19, 2011, 03:43 AM Time taken 8 mins 6 secs Marks 24/25 Grade 96 out of a maximum of 100 ( 96 %) Question 1 Marks: 1 In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side. Choose one answer. a. DoS b. brute force c. Man-in-the middle d. IP service Correct Marks for this submission: 1/1. Question 2 Marks: 1 A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses. Choose one answer. a. agent b. Trojan
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
c. port scanner d. socket Correct Marks for this submission: 1/1. Question 3 Marks: 1 Default Lock-Down allows the Windows XP or Windows Server 2003 system to be used as a router and a network address translation (NAT) system. Answer: TrueFalse Correct Marks for this submission: 1/1. Question 4 Marks: 1 The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system. Choose one answer. a. egress filtering b. session hijacking c. data authentication d. network sniffing Correct Marks for this submission: 1/1. Question 5 Marks: 1 A(n) ____ refers to a successful attempt to compromise a system’s security. Choose one answer. a. discovery b. exploit c. break-in d. gateway Correct Marks for this submission: 1/1.
Background image of page 2
Question 6 Marks: 1 A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/01/2011 for the course CNS 1 taught by Professor Idk during the Spring '11 term at Texas State Technical Colleges.

Page1 / 9

Chapter 9 Exam - Chapter 9 - TCP/IP Security Exam Review of...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online