Sie sind auf Seite 1von 4

Chapter 9 - TCP/IP Security Review Review of attempt 2

Top of Form

Finish review
Bottom of Form

Started on

Tuesday, July 19, 2011, 03:27 AM

Completed on

Tuesday, July 19, 2011, 03:33 AM

Time taken

5 mins 29 secs

Marks

14/15

Grade

93 out of a maximum of 100 (93%)

Question1
Marks: 9

Match each item with a statement below.


Permits would-be malefactors to identify potential targets for attacks.
Bactine

One kind of IP service that is vulnerable to attack


Remote logon service

Sends ICMP Echo Request packets to a range of IP addresses to determine which hosts are active.

PING sw eep

An examination of any traces of attack.


Computer forensics

Masquerades as innocuous or built-to-purpose programs.


Trojan horse program

Can be used to look inside suspect files without launching them.


Hex reader

An example of a Trojan horse program.


Back Orifice

Permits two parties to exchange sensitive information securely by using digital certificates to prove identities for both parties.

Public Key Infrastructure

Computer system deliberately setup to entice and trap attackers.


Honeypot

Partially correct Marks for this submission: 8/9.

Question2
Marks: 1

In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side. Choose one answer.
a. DoS

b. brute force c. Man-in-the middle d. IP service

Correct Marks for this submission: 1/1.

Question3
Marks: 1

A stealthy attackermay cover its tracks by deleting log files, or terminating any active direct connections. Answer: True False

Correct Marks for this submission: 1/1.

Question4
Marks: 1

Because of TCP/IPs optimistic security model, basic fundamental protocols offer no built-in security controls. Answer: True False

Correct Marks for this submission: 1/1.

Question5
Marks: 1

Default Lock-Down allows the Windows XP or Windows Server 2003 system to be used as a router and a network address translation (NAT) system. Answer: True False

Correct Marks for this submission: 1/1.

Question6
Marks: 1

Internet Security IP implementations make it possible to encrypt and protect segments at the Transport layer, thereby protecting the contents of all communications across the Internet at the Transport layer. Answer: True False

Correct Marks for this submission: 1/1.

Question7
Marks: 1

Proxy server software permits internal network addresses to be translated into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet. Answer: True False

Correct Marks for this submission: 1/1.


Top of Form

Finish review
Bottom of Form

Das könnte Ihnen auch gefallen