Professional Documents
Culture Documents
Network Security-Final Exam
Network Security-Final Exam
2- ---------------- is an attack in which an attacker injects malicious executable scripts into the
code of a trusted application or website.
A. Intruders B. Malware
C. Virus D. Trojan
9- Wireless networks use ---------------- to connect wireless-enabled devices in the network.
A. Wi-Fi B. NIC
C. Radio Frequency D. Bluetooth
10- ---------------- refers to a wireless system comprised of two components: tags and readers.
A. Wi-Fi B. NIC
C. RFID D. Bluetooth
11- ---------------- is a sequence of characters that uniquely names a Wi-Fi network.
A. SSID B. NIC
C. RFID D. Access point
12- ---------------- is an attacker traps people by using fake hotspots.
15- Which of the following is a common method for gaining unauthorized access to a network?
A. Phishing
B. Patching
C. Encryption
D. Authentication
17- Which of the following firewalls are used to track the state of active connections and
determine the network packets allowed to enter through the firewall? Each correct answer
represents a complete solution. Choose all that apply.
A. Circuit-level gateway
B. Stateful
C. Proxy server
D. Dynamic packet-filtering
18- Which of the following tools is an open-source network intrusion prevention and detection
system that operates as a network sniffer and logs activities of the network that are
matched with the predefined signatures?
19- Which of the following devices allows wireless communication devices to connect to a
wireless network using Wi-Fi, Bluetooth, or related standards?
A. Express card
B. WAP
C. WNIC
D. Wireless repeater
20- Which of the following refers to the exploitation of a valid computer session to gain
unauthorized access to information or services in a computer system?
A. Spoofing
B. Smurf
C. Session hijacking
D. Phishing
3- Rearrange the following steps to set up a firewall with a simple explanation of each step.[20 marks]