Thursday, May 5, 2011


Name Quiz for Topic 3 & 4
Status Completed
Score 420 out of 420 points
Instructions
Question 1 10 out of 10 points
____ is a popular protocol used to manage network equipment.
Selected Answer: SNMP
Correct Answer: SNMP
Question 2 10 out of 10 points
____ are active Internet connections that download a specific file that is
available through a tracker.
Selected Answer: Torrents
Correct Answer: Torrents
Question 3 10 out of 10 points
A(n) ____ is a computer programming language that is typically interpreted
into a language the computer can understand.
Selected Answer: scripting language
Correct Answer: scripting language
Question 4 10 out of 10 points
A(n) ____ is a small Web browser window that appears over the Web site that
is being viewed.
Selected Answer: popup
Correct Answer: popup
Question 5 10 out of 10 points
A ____ is a cumulative package of all security updates plus additional
features.
Selected Answer: service pack
Correct Answer: service pack
Question 6 10 out of 10 points
____ allows the administrator to configure a switch to redirect traffic that
occurs on some or all ports to a designated monitoring port on the switch.
Selected Answer: Port mirroring
Correct Answer: Port mirroring
Question 7 10 out of 10 points
DNS poisoning can be prevented by using the latest editions of the DNS
software, ____.
Selected Answer: BIND
Correct Answer: BIND
Question 8 10 out of 10 points
The ____ record is an entry in the Domain Name System (DNS) that identifies
the mail server responsible for handling that domain name.
Selected Answer: MX
Correct Answer: MX
Question 9 10 out of 10 points
A group of piconets in which connections exist between different piconets is
called a ____.
Selected Answer: scatternet
Correct Answer: scatternet
Question 10 10 out of 10 points
Instead of the Web server asking the user for the same information each time
she visits that site, the server can store that user-specific information in a file
on the user’s local computer and then retrieve it later. This file is called a(n)
____.
Selected Answer: cookie
Correct Answer: cookie
Question 11 10 out of 10 points
A(n) ____ is an account that is secretly set up without the administrator’s
knowledge or permission, that cannot be easily detected, and that allows for
remote access to the device.
Selected Answer: back door
Correct Answer: back door
Question 12 10 out of 10 points
____, also called add-ons, represent a specific way of implementing ActiveX
and are sometimes called ActiveX applications.
Selected Answer: ActiveX controls
Correct Answer: ActiveX controls
Question 13 10 out of 10 points
With wireless CSMA/CA, the amount of time that a device must wait after
the medium is clear is called the ____.
Selected Answer: slot time
Correct Answer: slot time
Question 14 10 out of 10 points
At regular intervals a wireless AP sends a beacon frame to announce its
presence and to provide the necessary information for devices that want to
join the network. This process is known as ____.
Selected Answer: beaconing
Correct Answer: beaconing
Question 15 10 out of 10 points
If SMTP relay is not controlled, an attacker can use it to forward thousands
of spam e-mail messages. An uncontrolled SMTP relay is known as a(n)
____.
Selected Answer: SMTP open relay
Correct Answer: SMTP open relay
Question 16 10 out of 10 points
In order for a host using TCP/IP on an Ethernet network to find the MAC
address of another device, it uses ____.
Selected Answer: ARP
Correct Answer: ARP
Question 17 10 out of 10 points
The ____ are the operating system settings that impose how the policy will
be enforced.
Selected Answer: configuration baselines
Correct Answer: configuration baselines
Question 18 10 out of 10 points
____ is a language used to view and manipulate data that is stored in a
relational database.
Selected Answer: SQL
Correct Answer: SQL
Question 19 10 out of 10 points
____ is real-time communication between two or more users.
Selected Answer: Instant messaging (IM)
Correct Answer: Instant messaging (IM)
Question 20 10 out of 10 points
Regarding e-mail, ____ handles outgoing mail.
Selected Answer: SMTP
Correct Answer: SMTP
Question 21 10 out of 10 points
____ is the name given to a wireless technology that uses short-range RF
transmissions.
Selected Answer: Bluetooth
Correct Answer: Bluetooth
Question 22 10 out of 10 points
An attacker could alter the MAC address in the ARP cache so that the
corresponding IP address would point to a different computer, which is
known as ____.
Selected Answer: ARP poisoning
Correct Answer: ARP poisoning
Question 23 10 out of 10 points
The goal of ____ is to make it harder to predict where the operating system
functionality resides in memory.
Selected Answer: ASLR
Correct Answer: ASLR
Question 24 10 out of 10 points
Wireless location mapping is the formal expression for ____.
Selected Answer: war driving
Correct Answer: war driving
Question 25 10 out of 10 points
____ hinges on an attacker being able to enter an SQL database query into a
dynamic Web page.
Selected Answer: SQL injection
Correct Answer: SQL injection
Question 26 10 out of 10 points
____ typically involves using client-side scripts written in JavaScript that are
designed to extract information from the victim and then pass the information
to the attacker.
Selected Answer: Cross site scripting (XSS)
Correct Answer: Cross site scripting (XSS)
Question 27 10 out of 10 points
____ enables the attacker’s computer to forward any network traffic it
receives from Computer A to the actual router.
Selected Answer: IP forwarding
Correct Answer: IP forwarding
Question 28 10 out of 10 points
BitTorrent maximizes the transfer speed by gathering pieces of the file and
downloading these pieces simultaneously from users who already have them
(the collective pieces are called a ____).
Selected Answer: swarm
Correct Answer: swarm
Question 29 10 out of 10 points
SMTP servers can forward e-mail sent from an e-mail client to a remote
domain. This is known as ____.
Selected Answer: SMTP relay
Correct Answer: SMTP relay
Question 30 10 out of 10 points
The most common type of antenna for war driving is an omnidirectional
antenna, also known as a ____ antenna.
Selected Answer: dipole
Correct Answer: dipole
Question 31 10 out of 10 points
A(n) ____ attack makes a copy of the transmission before sending it to the
recipient.
Selected Answer: replay
Correct Answer: replay
Question 32 10 out of 10 points
In a “____ attack,” a TCP/IP ping request is sent to all computers on the
network, which makes it appear that a server is asking for a response.
Selected Answer: smurf
Correct Answer: smurf
Question 33 10 out of 10 points
In a P2P network, a ____ is a server program operated by the person or
organization that wants to share the file.
Selected Answer: tracker
Correct Answer: tracker
Question 34 10 out of 10 points
____ is the unauthorized access of information from a wireless device
through a Bluetooth connection.
Selected Answer: Bluesnarfing
Correct Answer: Bluesnarfing
Question 35 10 out of 10 points
____ is a process of ensuring that any inputs are “clean” and will not corrupt
the system.
Selected Answer: Input validation
Correct Answer: Input validation
Question 36 10 out of 10 points
When TCP/IP was developed, the host table concept was expanded to a
hierarchical name system known as the ____.
Selected Answer: DNS
Correct Answer: DNS
Question 37 10 out of 10 points
One approach to substituting a fraudulent IP address is to target the external
DNS server and is called ____.
Selected Answer: DNS poisoning Correct Answer: DNS poisoning
Question 38 10 out of 10 points
____ is a Windows Vista and Windows XP Service Pack 2 (SP2) feature that
prevents attackers from using buffer overflow to execute malware.
Selected Answer: DEP
Correct Answer: DEP
Question 39 10 out of 10 points
The most common protocol suite used today for networks as well as the
Internet is ____.
Selected Answer: TCP/IP
Correct Answer: TCP/IP
Question 40 10 out of 10 points
Regarding e-mail, ____ is responsible for incoming mail.
Selected Answer: POP3
Correct Answer: POP3
Question 41 10 out of 10 points
Each wireless device looks for beacon frames in a process known as ____.
Selected Answer: scanning
Correct Answer: scanning
Question 42 10 out of 10 points
____ specifies that before a networked device starts to send, it should first
listen (called carrier sensing) to see if any other device is transmitting.
Selected Answer: CSMA/CD
Correct Answer: CSMA/CD

No comments:

Post a Comment