Data Link & Network Layers – Test Bank | Ch4 – 4th Ed - Test Bank | Guide to TCPIP 4e by Jeffrey Carrell by Jeffrey L. Carrell, Laura Chappell, Ed Tittel. DOCX document preview.

Data Link & Network Layers – Test Bank | Ch4 – 4th Ed

View Product website:

https://selldocx.com/docx/data-link-network-layers-test-bank-ch4-4th-ed-1322

Chapter 12: Securing TCP/IP Environments

Student: ___________________________________________________________________________

1. Fundamental protocols—including IP and TCP or UDP—offer no built-in security controls. 
True    False

 

2. A stealthy attackermay cover its tracks by deleting log files, or terminating any active direct connections. 
True    False

 

3. Proxy server software permits internal network addresses to be “translated” into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet. 
True    False

 

4. When users from outside the network attach to a service inside the network, they actually attach to the proxy server, which establishes a proxy session into the private side of the network from there. 
True    False

 

5. Strictly speaking, VPNs use tunneling protocols; therefore, they need to encrypt tunneled traffic. 
True    False

 

 A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses. 
A. agent
B. Trojan
C. port scanner
D. socket

 

 A(n) ____ reveals a system vulnerability and is often documented, either by the manufacturer or by an attacker. 
A. hole
B. exploit
C. break-in
D. attack

 

 A(n) ____ refers to a successful attempt to compromise a system’s security. 
A. discovery
B. exploit
C. break-in
D. gateway

 

 An attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while it’s in transit is called ____. 
A. brute force attack
B. user impersonation
C. session hijacking
D. packet sniffing

 

 In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side. 
A. DoS
B. brute force
C. man-in-the middle
D. IP service

 

 A ____ is a weak spot or known place of attack on any common operating system, application, or service. 
A. back door
B. hole
C. discovery
D. hash

 

 A ____ is an undocumented and illicit point of entry into an operating system or application added by a system’s programmers to bypass normal security. 
A. back door
B. hole
C. discovery
D. hash

 

 Any knowledgeable systems professional with the right toolkit can break into just about any system in ____ minutes or less if allowed unsupervised and unrestricted access to the computer on which such a system resides. 
A. 15
B. 20
C. 25
D. 30

 

 The purpose of ____ is to find out what you have and what is vulnerable. 
A. reconnaissance
B. covering-up
C. session hijacking
D. packet sniffing

 

 ____-related attacks include SYN Flood, broadcast amplification attacks, and buffer overflow. 
A. DoS
B. Brute force
C. Man-in-the middle
D. IP service

 

 ____ are designed to interrupt or completely disrupt operations of a network device or network communications. 
A. Trojan horse attacks
B. Dictionary attacks
C. DoS attacks
D. Worms

 

 ____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature. 
A. SA bundle
B. Spyware
C. Adware
D. Cache

 

 ____ is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer. 
A. SA bundle
B. Spyware
C. Adware
D. Cache

 

 ____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities. 
A. Ingress filtering
B. Data authentication
C. Network sniffing
D. Spoofing

 

 The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system. 
A. egress filtering
B. session hijacking
C. data authentication
D. network sniffing

 

 ____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information. 
A. Access control
B. Connectionless integrity
C. Data origin authentication
D. Confidentiality

 

 A function that provides ____ checks the integrity of each packet individually. 
A. access control
B. connectionless integrity
C. data origin authentication
D. confidentiality

 

 ____ is the ability to verify that the data received did in fact come from the named source. 
A. Access control
B. Connectionless integrity
C. Data origin authentication
D. Confidentiality

 

 A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks. 
A. firewall
B. bastion host
C. DMZ
D. boundary router

 

 A ____ is an area that’s accessible to both outsiders and insiders, but which establishes a buffer area between what’s completely inside and outside a network boundary. 
A. firewall
B. bastion host
C. DMZ
D. boundary router

 

 A ____ is a specially “hardened” software service or software/hardware product that erects a barrier to inspect and control traffic flow between networks. 
A. firewall
B. bastion host
C. DMZ
D. boundary router

 

 A(n) ____________________ model excludes users from access to resources, by default, and then adds whatever users need access to such resources as exceptions to the general exclusionary rule. 
________________________________________

 

 In a(n) ____________________ attack, a service is inundated with requests, or malformed service requests, which cause a server to hang or freeze, preventing it from responding to input. 
________________________________________

 

 A(n) ____________________ consists of creating hashed values for all words in a specialized dictionary of terms, then comparing those values to the hashed values in password files. 
________________________________________

 

 A(n) ____________________ is a weakness that can be accidentally triggered or intentionally exploited. 
________________________________________

 

 ____________________ attacks are DoS attacks that are launched from numerous devices. 
________________________________________

 

 Match each item with a statement below. 

 

 Discuss the difference between physical security and personnel security. 


 


 


 


 

 

 What is the difference between an attack and an exploit? 


 


 


 


 

 

 Briefly describe the following types of attacks: DoS, man-in-the-middle, and IP service. 


 


 


 


 

 

 Briefly describe IP service implementation vulnerabilities, and insecure IP protocols and services. 


 


 


 


 

 

 Discuss the risks of allowing anonymous access. 


 


 


 


 

 

 What is meant by the term buffer overflow? 


 


 


 


 

 

 Provide a brief definition of spoofing. 


 


 


 


 

 

 According to RFC 2401, what are the goals of IPSec? 


 


 


 


 

 

 Briefly define proxy server, screening host, and screening router. 


 


 


 


 

 

 What are the steps when planning and implementing firewalls and proxy servers on your networks? 


 


 


 


 

 

Chapter 12: Securing TCP/IP Environments

Document Information

Document Type:
DOCX
Chapter Number:
4
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 4 Data Link and Network Layer TCP/IP Protocols
Author:
Jeffrey L. Carrell, Laura Chappell, Ed Tittel

Connected Book

Test Bank | Guide to TCPIP 4e by Jeffrey Carrell

By Jeffrey L. Carrell, Laura Chappell, Ed Tittel

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party