Name  Quiz for Topic 3 & 4  
Status  Completed  
Score  420 out of 420 points    
Instructions   
  Question 1   10 out of 10 points    
____ is a popular protocol used to manage network equipment.  
Selected Answer:     SNMP  
Correct Answer:     SNMP  
  Question 2   10 out of 10 points    
____ are active Internet connections that download a specific file that is 
available through a tracker.        
Selected Answer:     Torrents  
Correct Answer:     Torrents  
  Question 3   10 out of 10 points    
A(n) ____ is a computer programming language that is typically interpreted 
into a language the computer can understand.        
Selected Answer:     scripting language  
Correct Answer:     scripting language  
  Question 4   10 out of 10 points    
A(n) ____ is a small Web browser window that appears over the Web site that 
is being viewed.        
Selected Answer:     popup  
Correct Answer:     popup  
  Question 5   10 out of 10 points    
A ____ is a cumulative package of all security updates plus additional 
features.        
Selected Answer:     service pack  
Correct Answer:     service pack  
  Question 6   10 out of 10 points    
____ allows the administrator to configure a switch to redirect traffic that 
occurs on some or all ports to a designated monitoring port on the switch.         
Selected Answer:     Port mirroring  
Correct Answer:     Port mirroring  
  Question 7   10 out of 10 points    
DNS poisoning can be prevented by using the latest editions of the DNS 
software, ____.        
Selected Answer:     BIND  
Correct Answer:     BIND  
  Question 8   10 out of 10 points    
The ____ record is an entry in the Domain Name System (DNS) that identifies 
the mail server responsible for handling that domain name.        
Selected Answer:     MX  
Correct Answer:     MX  
  Question 9   10 out of 10 points    
A group of piconets in which connections exist between different piconets is 
called a ____.        
Selected Answer:     scatternet  
Correct Answer:     scatternet  
  Question 10   10 out of 10 points    
Instead of the Web server asking the user for the same information each time 
she visits that site, the server can store that user-specific information in a file 
on the user’s local computer and then retrieve it later. This file is called a(n) 
____.  
Selected Answer:     cookie  
Correct Answer:     cookie  
  Question 11   10 out of 10 points    
A(n) ____ is an account that is secretly set up without the administrator’s 
knowledge or permission, that cannot be easily detected, and that allows for 
remote access to the device.  
Selected Answer:     back door  
Correct Answer:     back door  
  Question 12   10 out of 10 points    
____, also called add-ons, represent a specific way of implementing ActiveX 
and are sometimes called ActiveX applications.         
Selected Answer:     ActiveX controls  
Correct Answer:     ActiveX controls  
  Question 13   10 out of 10 points    
With wireless CSMA/CA, the amount of time that a device must wait after 
the medium is clear is called the ____.        
Selected Answer:     slot time  
Correct Answer:     slot time  
  Question 14   10 out of 10 points    
At regular intervals a wireless AP sends a beacon frame to announce its 
presence and to provide the necessary information for devices that want to 
join the network. This process is known as ____.  
Selected Answer:     beaconing  
Correct Answer:     beaconing  
  Question 15   10 out of 10 points    
If SMTP relay is not controlled, an attacker can use it to forward thousands 
of spam e-mail messages. An uncontrolled SMTP relay is known as a(n) 
____.  
Selected Answer:     SMTP open relay  
Correct Answer:     SMTP open relay  
  Question 16   10 out of 10 points    
In order for a host using TCP/IP on an Ethernet network to find the MAC 
address of another device, it uses ____.        
Selected Answer:     ARP  
Correct Answer:     ARP  
  Question 17   10 out of 10 points    
The ____ are the operating system settings that impose how the policy will 
be enforced.        
Selected Answer:     configuration baselines  
Correct Answer:     configuration baselines  
  Question 18   10 out of 10 points    
____ is a language used to view and manipulate data that is stored in a 
relational database.        
       Selected Answer:     SQL  
Correct Answer:     SQL  
  Question 19   10 out of 10 points    
____ is real-time communication between two or more users.  
Selected Answer:     Instant messaging (IM)  
Correct Answer:     Instant messaging (IM)  
  Question 20   10 out of 10 points    
Regarding e-mail, ____ handles outgoing mail.  
Selected Answer:     SMTP  
Correct Answer:     SMTP  
  Question 21   10 out of 10 points    
____ is the name given to a wireless technology that uses short-range RF 
transmissions.        
Selected Answer:     Bluetooth  
Correct Answer:     Bluetooth  
  Question 22   10 out of 10 points    
An attacker could alter the MAC address in the ARP cache so that the 
corresponding IP address would point to a different computer, which is 
known as ____.  
Selected Answer:     ARP poisoning  
Correct Answer:     ARP poisoning  
  Question 23   10 out of 10 points    
The goal of ____ is to make it harder to predict where the operating system 
functionality resides in memory.        
Selected Answer:     ASLR  
Correct Answer:     ASLR  
  Question 24   10 out of 10 points    
Wireless location mapping is the formal expression for ____.  
Selected Answer:     war driving  
Correct Answer:     war driving  
  Question 25   10 out of 10 points    
____ hinges on an attacker being able to enter an SQL database query into a 
     dynamic Web page.  
Selected Answer:     SQL injection  
Correct Answer:     SQL injection  
  Question 26   10 out of 10 points    
____ typically involves using client-side scripts written in JavaScript that are 
designed to extract information from the victim and then pass the information 
to the attacker.  
Selected Answer:     Cross site scripting (XSS)  
Correct Answer:     Cross site scripting (XSS)  
  Question 27   10 out of 10 points    
____ enables the attacker’s computer to forward any network traffic it 
receives from Computer A to the actual router.        
Selected Answer:     IP forwarding  
Correct Answer:     IP forwarding  
  Question 28   10 out of 10 points    
BitTorrent maximizes the transfer speed by gathering pieces of the file and 
downloading these pieces simultaneously from users who already have them 
(the collective pieces are called a ____).  
Selected Answer:     swarm  
Correct Answer:     swarm  
  Question 29   10 out of 10 points    
SMTP servers can forward e-mail sent from an e-mail client to a remote 
domain. This is known as ____.        
Selected Answer:     SMTP relay  
Correct Answer:     SMTP relay  
  Question 30   10 out of 10 points    
The most common type of antenna for war driving is an omnidirectional 
antenna, also known as a ____ antenna.        
Selected Answer:     dipole  
Correct Answer:     dipole  
  Question 31   10 out of 10 points    
A(n) ____ attack makes a copy of the transmission before sending it to the 
recipient.         
Selected Answer:     replay  
Correct Answer:     replay  
  Question 32   10 out of 10 points    
In a “____ attack,” a TCP/IP ping request is sent to all computers on the 
network, which makes it appear that a server is asking for a response.        
Selected Answer:     smurf  
Correct Answer:     smurf  
  Question 33   10 out of 10 points    
In a P2P network, a ____ is a server program operated by the person or 
organization that wants to share the file.        
Selected Answer:     tracker  
Correct Answer:     tracker  
  Question 34   10 out of 10 points    
____ is the unauthorized access of information from a wireless device 
through a Bluetooth connection.        
Selected Answer:     Bluesnarfing  
Correct Answer:     Bluesnarfing  
  Question 35   10 out of 10 points    
____ is a process of ensuring that any inputs are “clean” and will not corrupt 
the system.        
Selected Answer:     Input validation  
Correct Answer:     Input validation  
  Question 36   10 out of 10 points    
When TCP/IP was developed, the host table concept was expanded to a 
hierarchical name system known as the ____.        
Selected Answer:     DNS  
Correct Answer:     DNS  
  Question 37   10 out of 10 points    
One approach to substituting a fraudulent IP address is to target the external 
DNS server and is called ____.        
Selected Answer:     DNS poisoning        Correct Answer:     DNS poisoning  
  Question 38   10 out of 10 points    
____ is a Windows Vista and Windows XP Service Pack 2 (SP2) feature that 
prevents attackers from using buffer overflow to execute malware.        
Selected Answer:     DEP  
Correct Answer:     DEP  
  Question 39   10 out of 10 points    
The most common protocol suite used today for networks as well as the 
Internet is ____.        
Selected Answer:     TCP/IP  
Correct Answer:     TCP/IP  
  Question 40   10 out of 10 points    
Regarding e-mail, ____ is responsible for incoming mail.  
Selected Answer:     POP3  
Correct Answer:     POP3  
  Question 41   10 out of 10 points    
Each wireless device looks for beacon frames in a process known as ____.  
Selected Answer:     scanning  
Correct Answer:     scanning  
  Question 42   10 out of 10 points    
____ specifies that before a networked device starts to send, it should first 
listen (called carrier sensing) to see if any other device is transmitting.        
Selected Answer:     CSMA/CD  
Correct Answer:     CSMA/CD  
No comments:
Post a Comment