Data Link & Network Layers – Test Bank | Ch4 – 4th Ed - Test Bank | Guide to TCPIP 4e by Jeffrey Carrell by Jeffrey L. Carrell, Laura Chappell, Ed Tittel. DOCX document preview.
View Product website:
https://selldocx.com/docx/data-link-network-layers-test-bank-ch4-4th-ed-1322
Chapter 12: Securing TCP/IP Environments
Student: ___________________________________________________________________________
1. Fundamental protocols—including IP and TCP or UDP—offer no built-in security controls.
True False
2. A stealthy attackermay cover its tracks by deleting log files, or terminating any active direct connections.
True False
3. Proxy server software permits internal network addresses to be “translated” into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet.
True False
4. When users from outside the network attach to a service inside the network, they actually attach to the proxy server, which establishes a proxy session into the private side of the network from there.
True False
5. Strictly speaking, VPNs use tunneling protocols; therefore, they need to encrypt tunneled traffic.
True False
A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses.
A. agent
B. Trojan
C. port scanner
D. socket
A(n) ____ reveals a system vulnerability and is often documented, either by the manufacturer or by an attacker.
A. hole
B. exploit
C. break-in
D. attack
A(n) ____ refers to a successful attempt to compromise a system’s security.
A. discovery
B. exploit
C. break-in
D. gateway
An attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while it’s in transit is called ____.
A. brute force attack
B. user impersonation
C. session hijacking
D. packet sniffing
In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side.
A. DoS
B. brute force
C. man-in-the middle
D. IP service
A ____ is a weak spot or known place of attack on any common operating system, application, or service.
A. back door
B. hole
C. discovery
D. hash
A ____ is an undocumented and illicit point of entry into an operating system or application added by a system’s programmers to bypass normal security.
A. back door
B. hole
C. discovery
D. hash
Any knowledgeable systems professional with the right toolkit can break into just about any system in ____ minutes or less if allowed unsupervised and unrestricted access to the computer on which such a system resides.
A. 15
B. 20
C. 25
D. 30
The purpose of ____ is to find out what you have and what is vulnerable.
A. reconnaissance
B. covering-up
C. session hijacking
D. packet sniffing
____-related attacks include SYN Flood, broadcast amplification attacks, and buffer overflow.
A. DoS
B. Brute force
C. Man-in-the middle
D. IP service
____ are designed to interrupt or completely disrupt operations of a network device or network communications.
A. Trojan horse attacks
B. Dictionary attacks
C. DoS attacks
D. Worms
____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature.
A. SA bundle
B. Spyware
C. Adware
D. Cache
____ is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer.
A. SA bundle
B. Spyware
C. Adware
D. Cache
____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities.
A. Ingress filtering
B. Data authentication
C. Network sniffing
D. Spoofing
The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system.
A. egress filtering
B. session hijacking
C. data authentication
D. network sniffing
____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information.
A. Access control
B. Connectionless integrity
C. Data origin authentication
D. Confidentiality
A function that provides ____ checks the integrity of each packet individually.
A. access control
B. connectionless integrity
C. data origin authentication
D. confidentiality
____ is the ability to verify that the data received did in fact come from the named source.
A. Access control
B. Connectionless integrity
C. Data origin authentication
D. Confidentiality
A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks.
A. firewall
B. bastion host
C. DMZ
D. boundary router
A ____ is an area that’s accessible to both outsiders and insiders, but which establishes a buffer area between what’s completely inside and outside a network boundary.
A. firewall
B. bastion host
C. DMZ
D. boundary router
A ____ is a specially “hardened” software service or software/hardware product that erects a barrier to inspect and control traffic flow between networks.
A. firewall
B. bastion host
C. DMZ
D. boundary router
A(n) ____________________ model excludes users from access to resources, by default, and then adds whatever users need access to such resources as exceptions to the general exclusionary rule.
________________________________________
In a(n) ____________________ attack, a service is inundated with requests, or malformed service requests, which cause a server to hang or freeze, preventing it from responding to input.
________________________________________
A(n) ____________________ consists of creating hashed values for all words in a specialized dictionary of terms, then comparing those values to the hashed values in password files.
________________________________________
A(n) ____________________ is a weakness that can be accidentally triggered or intentionally exploited.
________________________________________
____________________ attacks are DoS attacks that are launched from numerous devices.
________________________________________
Match each item with a statement below.
Discuss the difference between physical security and personnel security.
What is the difference between an attack and an exploit?
Briefly describe the following types of attacks: DoS, man-in-the-middle, and IP service.
Briefly describe IP service implementation vulnerabilities, and insecure IP protocols and services.
Discuss the risks of allowing anonymous access.
What is meant by the term buffer overflow?
Provide a brief definition of spoofing.
According to RFC 2401, what are the goals of IPSec?
Briefly define proxy server, screening host, and screening router.
What are the steps when planning and implementing firewalls and proxy servers on your networks?
Chapter 12: Securing TCP/IP Environments
Document Information
Connected Book
Test Bank | Guide to TCPIP 4e by Jeffrey Carrell
By Jeffrey L. Carrell, Laura Chappell, Ed Tittel