Chapter #9 and 10

Is this your test? Login to manage it. If not, you can generate a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
2.
1 point
IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.
3.
1 point
TCP is the main ____ protocol that is responsible for establishing connections and the reliable data transport between devices.
4.
1 point
____ is used to relay query messages.
5.
1 point
SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.
6.
1 point
The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number.
7.
1 point
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.
8.
1 point
Routers operate at the ____ Layer.
9.
1 point
A ____ is a feature that controls a device’s tolerance for unanswered service requests and helps to prevent a DoS attack.
10.
1 point
____ can be used to determine whether new IP addresses are attempting to probe the network.
11.
1 point
Broadcast storms can be prevented with ____.
12.
1 point
It is possible to segment a network by physical devices grouped into logical units through a(n) ____.
13.
1 point
____ provides a greater degree of security by implementing port-based authentication.
14.
1 point
____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.
15.
1 point
____ is a pay-per-use computing model in which customers pay only for the computing resources they need.
16.
1 point
In the ____ cloud computing model, the customer has the highest level of control.
17.
1 point
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
18.
1 point
IEEE 802.1x is commonly used on wireless networks.
19.
1 point
IP telephony and Voice over IP (VoIP) are identical.
20.
1 point
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
21.
1 point
Bluetooth is a ____ technology designed for data communication over short distances.
22.
1 point
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.
23.
1 point
A group of piconets in which connections exist between different piconets is called a ____.
24.
1 point
___ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
25.
1 point
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
26.
1 point
A(n) ____ acts as the “base station” for the wireless network.
27.
1 point
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
28.
1 point
An ____ is an AP that is set up by an attacker.
29.
1 point
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.
30.
1 point
____ is designed to detect any changes in a packet, whether accidental or intentional.
31.
1 point
____ is the encryption protocol standard for WPA2.
32.
1 point
____ is a framework for transporting authentication protocols instead of the authentication protocol itself.
33.
1 point
EAP request packets are issued by the ____.
34.
1 point
____ requires mutual authentication used for WLAN encryption using Cisco client software.
35.
1 point
___ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.
36.
1 point
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
37.
1 point
____ allow a single access point to service different types of users.
38.
1 point
Bluetooth devices are not backward compatible with previous versions.
39.
1 point
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
40.
1 point
APs use antennas that radiate a signal in all directions.