You are on page 1of 18

Question 1

0.34 out of 0.34 points

A(n) ____ documents a vulnerability (i.e., a weakness), usually in the context of a recipe, or by including software tools used to mount an attack.
Answer Selected Answer: d.

exploit
Correct Answer: d.

exploit

Question 2
0.34 out of 0.34 points

A(n) ____ refers to a successful attempt to compromise a systems security.


Answer Selected Answer: d.

break-in
Correct Answer: d.

break-in

Question 3
0.34 out of 0.34 points

Trying every likely or possible password for an account is called a(n) ____.
Answer Selected Answer: a.

brute force attack


Correct Answer: a.

brute force attack

Question 4
0.34 out of 0.34 points

An attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while its in transit is called ____.
Answer Selected Answer: b.

packet sniffing
Correct Answer: b.

packet sniffing

Question 5
0.34 out of 0.34 points

In a(n) ____ attack, a service is inundated with service requests, or malformed service requests cause a server to hang.
Answer Selected Answer: c.

DoS
Correct Answer: c.

DoS

Question 6
0.34 out of 0.34 points

In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side.
Answer Selected Answer: b.

Man-in-the middle
Correct Answer: b.

Man-in-the middle

Question 7
0.34 out of 0.34 points

A ____ is a weak spot or known place of attack on any common operating system, application, or service.
Answer Selected Answer: a.

hole
Correct Answer: a.

hole

Question 8
0.34 out of 0.34 points

A ____ is an undocumented and illicit point of entry into an operating system or application added by a systems programmers to bypass normal security.
Answer Selected Answer: c.

back door
Correct Answer: c.

back door

Question 9
0.34 out of 0.34 points

A(n) ____ is a kind of virus that is self-replicating.


Answer

Selected Answer:

a.

worm
Correct Answer: a.

worm

Question 10
0.34 out of 0.34 points

____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature.
Answer Selected Answer: a.

Adware
Correct Answer: a.

Adware

Question 11
0.34 out of 0.34 points

____ is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer.
Answer Selected Answer: a.

Spyware
Correct Answer: a.

Spyware

Question 12
0.34 out of 0.34 points

____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities.
Answer Selected Answer: d.

Spoofing
Correct Answer: d.

Spoofing

Question 13
0.34 out of 0.34 points

The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system.
Answer Selected Answer: d.

session hijacking

Correct Answer:

d.

session hijacking

Question 14
0.34 out of 0.34 points

____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information.
Answer Selected Answer: b.

Access control
Correct Answer: b.

Access control

Question 15
0.34 out of 0.34 points

____ is the ability to verify that the data received did in fact come from the named source.
Answer Selected Answer: c.

Data origin authentication


Correct Answer: c.

Data origin authentication

Question 16
0.34 out of 0.34 points

A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks.
Answer Selected Answer: c.

bastion host
Correct Answer: c.

bastion host

Question 17
0.34 out of 0.34 points

A ____ is an area thats accessible to both outsiders and insiders, but which establishes a buffer area between whats completely inside and outside a network boundary.
Answer Selected Answer: a.

DMZ
Correct Answer: a.

DMZ

Question 18
0.34 out of 0.34 points

A ____ is a specially, hardened software service, or a software/hardware product, that erects a barrier to inspect and control traffic flow between networks.
Answer Selected Answer: a.

firewall
Correct Answer: a.

firewall

Question 19
0.34 out of 0.34 points

A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses.
Answer Selected Answer: d.

port scanner
Correct Answer: d.

port scanner

Question 20
0.34 out of 0.34 points

____ focuses on documenting network and system configuration data, and monitoring the effects of the use of various versions of hardware and software on network behavior, reliability, and performance.
Answer Selected Answer: a.

Configuration management
Correct Answer: a.

Configuration management

Question 21
0.34 out of 0.34 points

____ focuses on detecting, logging, and repairing network and system problems (whenever possible) to keep a network operating properly.
Answer Selected Answer: a.

Fault management
Correct Answer: a.

Fault management

Question 22
0.34 out of 0.34 points

____ focuses on controlling access to network resources to avoid denials of service and unwanted access or incursions into network resources, and restrict access to resources solely on the basis of proper authentication and authorization.
Answer Selected Answer: a.

Security management
Correct Answer: a.

Security management

Question 23
0.34 out of 0.34 points

A(n) ____ management solution supports communications between management agents and the manager device, regardless of the status of the data network.
Answer Selected Answer: d.

out-of-band
Correct Answer: d.

out-of-band

Question 24
0.34 out of 0.34 points

____ uses plain text passwords, called community names, or strings, passed between the SNMP client and manager to validate the authenticity of the data and/or the requestor of the data.
Answer Selected Answer: a.

SNMPv1
Correct Answer: a.

SNMPv1

Question 25
0.34 out of 0.34 points

A(n) ____ is a database of manageable objects for a device.


Answer Selected Answer: c.

Management Information Base


Correct Answer: c.

Management Information Base

Question 26
0.34 out of 0.34 points

The ____ MIB is used to monitor and administer remote segments of a distributed network.

Answer Selected Answer: c.

Remote Monitoring
Correct Answer: c.

Remote Monitoring

Question 27
0.34 out of 0.34 points

RMON places agents, called ____ at various locations on the distributed network.
Answer Selected Answer: b.

network probes
Correct Answer: b.

network probes

Question 28
0.34 out of 0.34 points

Distributed networks usually evolve over time and become ____.


Answer Selected Answer: a.

heterogeneous environments
Correct Answer: a.

heterogeneous environments

Question 29
0.34 out of 0.34 points

The ____ command is used to read a single entry within a MIB.


Answer Selected Answer: a.

GET-REQUEST
Correct Answer: a.

GET-REQUEST

Question 30
0.34 out of 0.34 points

When an SNMP manager wants to read a series of entries in a MIB table, it uses the ____ command.
Answer Selected Answer: c.

GET-NEXT
Correct Answer: c.

GET-NEXT

Question 31
0.34 out of 0.34 points

The ____ command is the active controller for SNMP capabilities and reporting on managed devices.
Answer Selected Answer: b.

SET
Correct Answer: b.

SET

Question 32
0.34 out of 0.34 points

____ messages are sent gratuitously by the SNMP agent to the SNMP manager when an event setting or trigger is exceeded.
Answer Selected Answer: b.

TRAP
Correct Answer: b.

TRAP

Question 33
0.34 out of 0.34 points

The ____ community name is used to access the MIB and read the object values.
Answer Selected Answer: b.

Read-Only
Correct Answer: b.

Read-Only

Question 34
0.34 out of 0.34 points

The ____ community name is used to change the contents of the MIB.
Answer Selected Answer: a.

Read/Write
Correct Answer: a.

Read/Write

Question 35
0.34 out of 0.34 points

The ____ community name is used to access the trap settings on an SNMP manager.
Answer

Selected Answer:

c.

Alert
Correct Answer: c.

Alert

Question 36
0.34 out of 0.34 points

In practice, most SNMP consoles are part of a software package commonly called a(n) ____.
Answer Selected Answer: c.

framework
Correct Answer: c.

framework

Question 37
0.34 out of 0.34 points

SNMP is a request/response-based protocol used to transport management messages between a(n) ____ and an SNMP manager.
Answer Selected Answer: d.

SNMP agent
Correct Answer: d.

SNMP agent

Question 38
0.34 out of 0.34 points

____ offers the Engineers Edition Toolset, a popular suite of SNMP utilities that includes MIB browsers and sweepers.
Answer Selected Answer: a.

SolarWinds.net
Correct Answer: a.

SolarWinds.net

Question 39
0.34 out of 0.34 points

The first Microsoft operating system to use DNS is Windows ____.


Answer Correct Answer: a.

2000
Correct Answer: a.

2000

Question 40
0.34 out of 0.34 points

The preferred form of networking in an all-Windows 2000 and/or Windows XP environment is direct hosting of the (SMB) protocol, with ____ as the domain controller, and DNS for name resolution.
Answer Selected Answer: a.

Active Directory
Correct Answer: a.

Active Directory

Question 41
0.34 out of 0.34 points

The Windows 2000 and Windows XP operating systems use a NetBIOS ____ to permit applications, such as SMB and Lotus Notes, to make NetBIOS calls and translate those calls into commands sent to the Windows 2000 and Windows XP TDI.
Answer Selected Answer: c.

emulator
Correct Answer: c.

emulator

Question 42
0.34 out of 0.34 points

The ____ driver(s) presents the transport protocols with a common set of entry points for the network adapter(s) installed on the computer.
Answer Selected Answer: d.

Network Driver Interface Specification


Correct Answer: d.

Network Driver Interface Specification

Question 43
0.34 out of 0.34 points

____ are used for connectionless announcement type traffic, or for request and response traffic that does not require the establishment and maintenance of a reliable connection between two hosts.
Answer Selected Answer: c.

Datagrams
Correct Answer: c.

Datagrams

Question 44
0.34 out of 0.34 points

____ is a connectionless protocol.


Answer Selected Answer: d.

UDP
Correct Answer: d.

UDP

Question 45
0.34 out of 0.34 points

____ creates and maintains a reliable connection more consistent with NetBIOS session needs.
Answer Selected Answer: b.

TCP
Correct Answer: b.

TCP

Question 46
0.34 out of 0.34 points

NetBIOS names are based on the user name during ____ and the information configured for the specific computer in the Network applet in Control Panel.
Answer Correct Answer: b.

logon
Correct Answer: b.

logon

Question 47
0.34 out of 0.34 points

NetBIOS ____ names resolve to a single address.


Answer Selected Answer: a.

unique
Correct Answer: a.

unique

Question 48
0.34 out of 0.34 points

NetBIOS names are ____ characters in length and are divided into two parts.
Answer Selected Answer: c.

16
Correct Answer: c.

16

Question 49
0.34 out of 0.34 points

A(n) ____ registers and resolves names by using only broadcasts.


Answer Selected Answer: c.

b-node
Correct Answer: c.

b-node

Question 50
0.34 out of 0.34 points

A(n) ____ attempts to register and resolve names using the local WINS server.
Answer Selected Answer: b.

p-node
Correct Answer: b.

p-node

Question 51
0.34 out of 0.34 points

When a(n) ____ computer or process shuts down gracefully, it sends a Name Release Request packet to the WINS server to indicate that it is no longer using the name, thus releasing the name.
Answer Selected Answer: c.

p-node
Correct Answer: c.

p-node

Question 52
0.34 out of 0.34 points

____ methods are used only when broadcast methods fail.


Answer Selected Answer: d.

P-node

Correct Answer:

d.

P-node

Question 53
0.34 out of 0.34 points

The ____ is a hybrid that uses the p-node method as its first choice.
Answer Selected Answer: b.

h-node
Correct Answer: b.

h-node

Question 54
0.34 out of 0.34 points

____ is a server service, running under Windows NT Server,Windows 2000 Server, or Windows Server 2003.
Answer Selected Answer: c.

WINS
Correct Answer: c.

WINS

Question 55
0.34 out of 0.34 points

The ____ command-line tool in Windows Server 2003 is helpful for WINS servers over WAN links to better manage slower network connections.
Answer Selected Answer: b.

Netsh
Correct Answer: b.

Netsh

Question 56
0.34 out of 0.34 points

M/S DNS servers in the ____ domain provide reverse lookup, returning the name(s) associated with a particular IP address.
Answer Selected Answer: d.

in-addr.arpa
Correct Answer: d.

in-addr.arpa

Question 57
0.34 out of 0.34 points

Which of the following is not true concerning differences between IPv4 and IPv6?
Answer Selected Answer: b.

IPv4 uses both TCP and UDP for transport whereas IPv6 only uses TCP.
Correct Answer: b.

IPv4 uses both TCP and UDP for transport whereas IPv6 only uses TCP.

Question 58
0.34 out of 0.34 points

Multicast addresses in IPv6 use a four-bit ____, which is a four-bit field that limits the valid range for a multicast address to define the portion of the Internet over which the multicast group is valid.
Answer Selected Answer: d.

scope identifier
Correct Answer: d.

scope identifier

Question 59
0.34 out of 0.34 points

Nodes that need to tunnel IPv6 packets through IPv4 routers use the IPv4-compatible addresses. These are called dual ____.
Answer Selected Answer: d.

stack nodes
Correct Answer: d.

stack nodes

Question 60
0.34 out of 0.34 points

____ is the name of a special IP address that allows a host on a network to check the operation of its own local TCP/IP protocol stack.
Answer Selected Answer: b.

Loopback
Correct Answer: b.

Loopback

Question 61
0.34 out of 0.34 points

____ must announce that they wish to receive multicast traffic bound for a particular multicast address.
Answer

Correct Answer:

c.

Nodes
Correct Answer: c.

Nodes

Question 62
0.34 out of 0.34 points

A special type of multicast address called the ____ address is used to support Neighbor Solicitation (NS).
Answer Selected Answer: b.

solicited node
Correct Answer: b.

solicited node

Question 63
0.34 out of 0.34 points

IPv6 ____ protocol, specified in RFC 2461, defines mechanisms whereby nodes can find out on what link they are located, learn their subnet prefix, where the links working routers reside, who their neighbors are, which of them is active, and in all cases, to associate a link layer address (such as an Ethernet MAC address) with an IPv6 address.
Answer Selected Answer: b.

Neighbor Discovery
Correct Answer: b.

Neighbor Discovery

Question 64
0.34 out of 0.34 points

A node can send a ____ to find (or verify) the link layer address of a local node, see if that node is still available, or check that its own address is not in use by another node.
Answer Selected Answer: b.

Neighbor Solicitation
Correct Answer: b.

Neighbor Solicitation

Question 65
0.34 out of 0.34 points

When a router knows a better first hop for a particular address (better than itself), it sends a ____ message to the sender.
Answer Selected Answer: d.

Redirect
Correct Answer: d.

Redirect

Question 66
0.34 out of 0.34 points

The ____ is a multicast address with link-local scope that helps reduce the number of multicast groups to which nodes must subscribe to make themselves available for solicitation by other nodes on their local links.
Answer Selected Answer: c.

solicited node address


Correct Answer: c.

solicited node address

Question 67
0.34 out of 0.34 points

A ____ is a set of packets for which a source requires special handling by the intervening routers.
Answer Selected Answer: a.

flow
Correct Answer: a.

flow

Question 68
0.34 out of 0.34 points

In IPv6, the ____ field (one byte) indicates the upcoming extension header, transport protocol, or other protocol.
Answer Selected Answer: a.

Next Header
Correct Answer: a.

Next Header

Question 69
0.34 out of 0.34 points

Which extension header supports strict or loose source routing for IPv6?
Answer Selected Answer: c.

Routing
Correct Answer: c.

Routing

Question 70
0.34 out of 0.34 points

The ____ process is used to provide source stations with the maximum fragment size supported by a path.
Answer Selected Answer: d.

PMTU Discovery
Correct Answer: d.

PMTU Discovery

Question 71
0.34 out of 0.34 points

____ allows a host to find the information it needs to set up its own IP networking parameters by querying other nodes.
Answer Selected Answer: b.

Autoconfiguration
Correct Answer: b.

Autoconfiguration

Question 72
0.34 out of 0.34 points

Computer security takes advantage of the fact that computer information is basically just numbers. It is based on sets of mathematical manipulations called ____.
Answer Selected Answer: d.

transformations
Correct Answer: d.

transformations

Question 73
0.34 out of 0.34 points

The purpose of ____ is to keep communications secret or private.


Answer Selected Answer: d.

encryption
Correct Answer: d.

encryption

Question 74
0.34 out of 0.34 points

____ is the ability of a network to provide better service to specific types of network traffic and is handled by the diffserv working group at the IETF.
Answer Selected Answer: a.

Quality of Service
Correct Answer: a.

Quality of Service

Question 75
0.34 out of 0.34 points

As in IPv4, mobile users in IPv6 require the help of a router located on their home networks, called a ____.
Answer Selected Answer: c.

home agent
Correct Answer: c.

home agent