Beruflich Dokumente
Kultur Dokumente
A(n) ____ documents a vulnerability (i.e., a weakness), usually in the context of a recipe, or by including software tools used to mount an attack.
Answer Selected Answer: d.
exploit
Correct Answer: d.
exploit
Question 2
0.34 out of 0.34 points
break-in
Correct Answer: d.
break-in
Question 3
0.34 out of 0.34 points
Trying every likely or possible password for an account is called a(n) ____.
Answer Selected Answer: a.
Question 4
0.34 out of 0.34 points
An attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while its in transit is called ____.
Answer Selected Answer: b.
packet sniffing
Correct Answer: b.
packet sniffing
Question 5
0.34 out of 0.34 points
In a(n) ____ attack, a service is inundated with service requests, or malformed service requests cause a server to hang.
Answer Selected Answer: c.
DoS
Correct Answer: c.
DoS
Question 6
0.34 out of 0.34 points
In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side.
Answer Selected Answer: b.
Man-in-the middle
Correct Answer: b.
Man-in-the middle
Question 7
0.34 out of 0.34 points
A ____ is a weak spot or known place of attack on any common operating system, application, or service.
Answer Selected Answer: a.
hole
Correct Answer: a.
hole
Question 8
0.34 out of 0.34 points
A ____ is an undocumented and illicit point of entry into an operating system or application added by a systems programmers to bypass normal security.
Answer Selected Answer: c.
back door
Correct Answer: c.
back door
Question 9
0.34 out of 0.34 points
Selected Answer:
a.
worm
Correct Answer: a.
worm
Question 10
0.34 out of 0.34 points
____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature.
Answer Selected Answer: a.
Adware
Correct Answer: a.
Adware
Question 11
0.34 out of 0.34 points
____ is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer.
Answer Selected Answer: a.
Spyware
Correct Answer: a.
Spyware
Question 12
0.34 out of 0.34 points
____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities.
Answer Selected Answer: d.
Spoofing
Correct Answer: d.
Spoofing
Question 13
0.34 out of 0.34 points
The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system.
Answer Selected Answer: d.
session hijacking
Correct Answer:
d.
session hijacking
Question 14
0.34 out of 0.34 points
____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information.
Answer Selected Answer: b.
Access control
Correct Answer: b.
Access control
Question 15
0.34 out of 0.34 points
____ is the ability to verify that the data received did in fact come from the named source.
Answer Selected Answer: c.
Question 16
0.34 out of 0.34 points
A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks.
Answer Selected Answer: c.
bastion host
Correct Answer: c.
bastion host
Question 17
0.34 out of 0.34 points
A ____ is an area thats accessible to both outsiders and insiders, but which establishes a buffer area between whats completely inside and outside a network boundary.
Answer Selected Answer: a.
DMZ
Correct Answer: a.
DMZ
Question 18
0.34 out of 0.34 points
A ____ is a specially, hardened software service, or a software/hardware product, that erects a barrier to inspect and control traffic flow between networks.
Answer Selected Answer: a.
firewall
Correct Answer: a.
firewall
Question 19
0.34 out of 0.34 points
A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses.
Answer Selected Answer: d.
port scanner
Correct Answer: d.
port scanner
Question 20
0.34 out of 0.34 points
____ focuses on documenting network and system configuration data, and monitoring the effects of the use of various versions of hardware and software on network behavior, reliability, and performance.
Answer Selected Answer: a.
Configuration management
Correct Answer: a.
Configuration management
Question 21
0.34 out of 0.34 points
____ focuses on detecting, logging, and repairing network and system problems (whenever possible) to keep a network operating properly.
Answer Selected Answer: a.
Fault management
Correct Answer: a.
Fault management
Question 22
0.34 out of 0.34 points
____ focuses on controlling access to network resources to avoid denials of service and unwanted access or incursions into network resources, and restrict access to resources solely on the basis of proper authentication and authorization.
Answer Selected Answer: a.
Security management
Correct Answer: a.
Security management
Question 23
0.34 out of 0.34 points
A(n) ____ management solution supports communications between management agents and the manager device, regardless of the status of the data network.
Answer Selected Answer: d.
out-of-band
Correct Answer: d.
out-of-band
Question 24
0.34 out of 0.34 points
____ uses plain text passwords, called community names, or strings, passed between the SNMP client and manager to validate the authenticity of the data and/or the requestor of the data.
Answer Selected Answer: a.
SNMPv1
Correct Answer: a.
SNMPv1
Question 25
0.34 out of 0.34 points
Question 26
0.34 out of 0.34 points
The ____ MIB is used to monitor and administer remote segments of a distributed network.
Remote Monitoring
Correct Answer: c.
Remote Monitoring
Question 27
0.34 out of 0.34 points
RMON places agents, called ____ at various locations on the distributed network.
Answer Selected Answer: b.
network probes
Correct Answer: b.
network probes
Question 28
0.34 out of 0.34 points
heterogeneous environments
Correct Answer: a.
heterogeneous environments
Question 29
0.34 out of 0.34 points
GET-REQUEST
Correct Answer: a.
GET-REQUEST
Question 30
0.34 out of 0.34 points
When an SNMP manager wants to read a series of entries in a MIB table, it uses the ____ command.
Answer Selected Answer: c.
GET-NEXT
Correct Answer: c.
GET-NEXT
Question 31
0.34 out of 0.34 points
The ____ command is the active controller for SNMP capabilities and reporting on managed devices.
Answer Selected Answer: b.
SET
Correct Answer: b.
SET
Question 32
0.34 out of 0.34 points
____ messages are sent gratuitously by the SNMP agent to the SNMP manager when an event setting or trigger is exceeded.
Answer Selected Answer: b.
TRAP
Correct Answer: b.
TRAP
Question 33
0.34 out of 0.34 points
The ____ community name is used to access the MIB and read the object values.
Answer Selected Answer: b.
Read-Only
Correct Answer: b.
Read-Only
Question 34
0.34 out of 0.34 points
The ____ community name is used to change the contents of the MIB.
Answer Selected Answer: a.
Read/Write
Correct Answer: a.
Read/Write
Question 35
0.34 out of 0.34 points
The ____ community name is used to access the trap settings on an SNMP manager.
Answer
Selected Answer:
c.
Alert
Correct Answer: c.
Alert
Question 36
0.34 out of 0.34 points
In practice, most SNMP consoles are part of a software package commonly called a(n) ____.
Answer Selected Answer: c.
framework
Correct Answer: c.
framework
Question 37
0.34 out of 0.34 points
SNMP is a request/response-based protocol used to transport management messages between a(n) ____ and an SNMP manager.
Answer Selected Answer: d.
SNMP agent
Correct Answer: d.
SNMP agent
Question 38
0.34 out of 0.34 points
____ offers the Engineers Edition Toolset, a popular suite of SNMP utilities that includes MIB browsers and sweepers.
Answer Selected Answer: a.
SolarWinds.net
Correct Answer: a.
SolarWinds.net
Question 39
0.34 out of 0.34 points
2000
Correct Answer: a.
2000
Question 40
0.34 out of 0.34 points
The preferred form of networking in an all-Windows 2000 and/or Windows XP environment is direct hosting of the (SMB) protocol, with ____ as the domain controller, and DNS for name resolution.
Answer Selected Answer: a.
Active Directory
Correct Answer: a.
Active Directory
Question 41
0.34 out of 0.34 points
The Windows 2000 and Windows XP operating systems use a NetBIOS ____ to permit applications, such as SMB and Lotus Notes, to make NetBIOS calls and translate those calls into commands sent to the Windows 2000 and Windows XP TDI.
Answer Selected Answer: c.
emulator
Correct Answer: c.
emulator
Question 42
0.34 out of 0.34 points
The ____ driver(s) presents the transport protocols with a common set of entry points for the network adapter(s) installed on the computer.
Answer Selected Answer: d.
Question 43
0.34 out of 0.34 points
____ are used for connectionless announcement type traffic, or for request and response traffic that does not require the establishment and maintenance of a reliable connection between two hosts.
Answer Selected Answer: c.
Datagrams
Correct Answer: c.
Datagrams
Question 44
0.34 out of 0.34 points
UDP
Correct Answer: d.
UDP
Question 45
0.34 out of 0.34 points
____ creates and maintains a reliable connection more consistent with NetBIOS session needs.
Answer Selected Answer: b.
TCP
Correct Answer: b.
TCP
Question 46
0.34 out of 0.34 points
NetBIOS names are based on the user name during ____ and the information configured for the specific computer in the Network applet in Control Panel.
Answer Correct Answer: b.
logon
Correct Answer: b.
logon
Question 47
0.34 out of 0.34 points
unique
Correct Answer: a.
unique
Question 48
0.34 out of 0.34 points
NetBIOS names are ____ characters in length and are divided into two parts.
Answer Selected Answer: c.
16
Correct Answer: c.
16
Question 49
0.34 out of 0.34 points
b-node
Correct Answer: c.
b-node
Question 50
0.34 out of 0.34 points
A(n) ____ attempts to register and resolve names using the local WINS server.
Answer Selected Answer: b.
p-node
Correct Answer: b.
p-node
Question 51
0.34 out of 0.34 points
When a(n) ____ computer or process shuts down gracefully, it sends a Name Release Request packet to the WINS server to indicate that it is no longer using the name, thus releasing the name.
Answer Selected Answer: c.
p-node
Correct Answer: c.
p-node
Question 52
0.34 out of 0.34 points
P-node
Correct Answer:
d.
P-node
Question 53
0.34 out of 0.34 points
The ____ is a hybrid that uses the p-node method as its first choice.
Answer Selected Answer: b.
h-node
Correct Answer: b.
h-node
Question 54
0.34 out of 0.34 points
____ is a server service, running under Windows NT Server,Windows 2000 Server, or Windows Server 2003.
Answer Selected Answer: c.
WINS
Correct Answer: c.
WINS
Question 55
0.34 out of 0.34 points
The ____ command-line tool in Windows Server 2003 is helpful for WINS servers over WAN links to better manage slower network connections.
Answer Selected Answer: b.
Netsh
Correct Answer: b.
Netsh
Question 56
0.34 out of 0.34 points
M/S DNS servers in the ____ domain provide reverse lookup, returning the name(s) associated with a particular IP address.
Answer Selected Answer: d.
in-addr.arpa
Correct Answer: d.
in-addr.arpa
Question 57
0.34 out of 0.34 points
Which of the following is not true concerning differences between IPv4 and IPv6?
Answer Selected Answer: b.
IPv4 uses both TCP and UDP for transport whereas IPv6 only uses TCP.
Correct Answer: b.
IPv4 uses both TCP and UDP for transport whereas IPv6 only uses TCP.
Question 58
0.34 out of 0.34 points
Multicast addresses in IPv6 use a four-bit ____, which is a four-bit field that limits the valid range for a multicast address to define the portion of the Internet over which the multicast group is valid.
Answer Selected Answer: d.
scope identifier
Correct Answer: d.
scope identifier
Question 59
0.34 out of 0.34 points
Nodes that need to tunnel IPv6 packets through IPv4 routers use the IPv4-compatible addresses. These are called dual ____.
Answer Selected Answer: d.
stack nodes
Correct Answer: d.
stack nodes
Question 60
0.34 out of 0.34 points
____ is the name of a special IP address that allows a host on a network to check the operation of its own local TCP/IP protocol stack.
Answer Selected Answer: b.
Loopback
Correct Answer: b.
Loopback
Question 61
0.34 out of 0.34 points
____ must announce that they wish to receive multicast traffic bound for a particular multicast address.
Answer
Correct Answer:
c.
Nodes
Correct Answer: c.
Nodes
Question 62
0.34 out of 0.34 points
A special type of multicast address called the ____ address is used to support Neighbor Solicitation (NS).
Answer Selected Answer: b.
solicited node
Correct Answer: b.
solicited node
Question 63
0.34 out of 0.34 points
IPv6 ____ protocol, specified in RFC 2461, defines mechanisms whereby nodes can find out on what link they are located, learn their subnet prefix, where the links working routers reside, who their neighbors are, which of them is active, and in all cases, to associate a link layer address (such as an Ethernet MAC address) with an IPv6 address.
Answer Selected Answer: b.
Neighbor Discovery
Correct Answer: b.
Neighbor Discovery
Question 64
0.34 out of 0.34 points
A node can send a ____ to find (or verify) the link layer address of a local node, see if that node is still available, or check that its own address is not in use by another node.
Answer Selected Answer: b.
Neighbor Solicitation
Correct Answer: b.
Neighbor Solicitation
Question 65
0.34 out of 0.34 points
When a router knows a better first hop for a particular address (better than itself), it sends a ____ message to the sender.
Answer Selected Answer: d.
Redirect
Correct Answer: d.
Redirect
Question 66
0.34 out of 0.34 points
The ____ is a multicast address with link-local scope that helps reduce the number of multicast groups to which nodes must subscribe to make themselves available for solicitation by other nodes on their local links.
Answer Selected Answer: c.
Question 67
0.34 out of 0.34 points
A ____ is a set of packets for which a source requires special handling by the intervening routers.
Answer Selected Answer: a.
flow
Correct Answer: a.
flow
Question 68
0.34 out of 0.34 points
In IPv6, the ____ field (one byte) indicates the upcoming extension header, transport protocol, or other protocol.
Answer Selected Answer: a.
Next Header
Correct Answer: a.
Next Header
Question 69
0.34 out of 0.34 points
Which extension header supports strict or loose source routing for IPv6?
Answer Selected Answer: c.
Routing
Correct Answer: c.
Routing
Question 70
0.34 out of 0.34 points
The ____ process is used to provide source stations with the maximum fragment size supported by a path.
Answer Selected Answer: d.
PMTU Discovery
Correct Answer: d.
PMTU Discovery
Question 71
0.34 out of 0.34 points
____ allows a host to find the information it needs to set up its own IP networking parameters by querying other nodes.
Answer Selected Answer: b.
Autoconfiguration
Correct Answer: b.
Autoconfiguration
Question 72
0.34 out of 0.34 points
Computer security takes advantage of the fact that computer information is basically just numbers. It is based on sets of mathematical manipulations called ____.
Answer Selected Answer: d.
transformations
Correct Answer: d.
transformations
Question 73
0.34 out of 0.34 points
encryption
Correct Answer: d.
encryption
Question 74
0.34 out of 0.34 points
____ is the ability of a network to provide better service to specific types of network traffic and is handled by the diffserv working group at the IETF.
Answer Selected Answer: a.
Quality of Service
Correct Answer: a.
Quality of Service
Question 75
0.34 out of 0.34 points
As in IPv4, mobile users in IPv6 require the help of a router located on their home networks, called a ____.
Answer Selected Answer: c.
home agent
Correct Answer: c.
home agent