Network+ Guide to Networks 6th Edition by Tamara Dean – Test Bank
MULTIPLE CHOICE
1. ____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
a. Cracking c. War driving
b. Hacking d. Phishing
ANS: D PTS: 1 REF: 496
2. In a ____ attack, a person redirects or captures secure transmissions as they occur.
a. denial-of service c. war driving
b. man-in-the-middle d. phishing
ANS: B PTS: 1 REF: 497-498
3. ____ software searches a node for open ports.
a. Phishing c. Authentication
b. Sniffing d. Port scanner
ANS: D PTS: 1 REF: 498
4. A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.
a. people c. protocols and software
b. transmission and hardware d. Internet access
ANS: B PTS: 1 REF: 498
5. A NOS that contains a “back door”is an example of a risk associated with ____.
a. people c. protocols and software
b. transmission and hardware d. Internet access
ANS: C PTS: 1 REF: 499
6. A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
a. flashing c. war driving
b. denial-of-service d. phishing
ANS: A PTS: 1 REF: 499
7. A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
a. flashing c. war driving
b. denial-of-service d. phishing
ANS: B PTS: 1 REF: 501
8. A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
a. switch’s c. router’s
b. gateway’s d. proxy server’s
ANS: C PTS: 1 REF: 506
9. A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
a. packet-filtering c. proxy
b. gateway d. selective
ANS: A PTS: 1 REF: 509
10. A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
a. flashing c. dictionary
b. denial-of-service d. brute force
ANS: C PTS: 1 REF: 515
Reviews
There are no reviews yet.