Beruflich Dokumente
Kultur Dokumente
Top of Form
Finish review
Bottom of Form
Started on
Completed on
Time taken
5 mins 29 secs
Marks
14/15
Grade
Question1
Marks: 9
Sends ICMP Echo Request packets to a range of IP addresses to determine which hosts are active.
PING sw eep
Permits two parties to exchange sensitive information securely by using digital certificates to prove identities for both parties.
Question2
Marks: 1
In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side. Choose one answer.
a. DoS
Question3
Marks: 1
A stealthy attackermay cover its tracks by deleting log files, or terminating any active direct connections. Answer: True False
Question4
Marks: 1
Because of TCP/IPs optimistic security model, basic fundamental protocols offer no built-in security controls. Answer: True False
Question5
Marks: 1
Default Lock-Down allows the Windows XP or Windows Server 2003 system to be used as a router and a network address translation (NAT) system. Answer: True False
Question6
Marks: 1
Internet Security IP implementations make it possible to encrypt and protect segments at the Transport layer, thereby protecting the contents of all communications across the Internet at the Transport layer. Answer: True False
Question7
Marks: 1
Proxy server software permits internal network addresses to be translated into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet. Answer: True False
Finish review
Bottom of Form