Reference no: EM13914637
Question 1. An activist can best be described as which of the following?
- An unskilled programmer that spreads malicious scripts
- Consider themselves seekers of knowledge
- Use DoS attacks on websites with which they disagree
- Deface websites by leaving messages for their friends to read
Question 2. Which type of firewall policy calls for a firewall to deny all traffic by default?
- Permissive policy
- Perimeter policy
- Restrictive policy
- Demilitarized policy
Question 3. What is a program that appears to do something useful but is actually malware?
- Virus
- Logic bomb
- Trojan
- Back door
Question 4. In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?
- Basic
- Challenge/response
- Biometrics
- Signature
Question 5. Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
- Malicious port scanning
- Man-in-the-middle
- Denial of service
- Remote procedure call
Question 6. How large is the IPv6 address space?
- 32 bits
- 128 bits
- 64 bits
- 168 bits
Question 7. Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?
- TTL
- Fragment Offset
- ECN
- Options
Question 8.8.Which protocol is responsible for automatic assignment of IP addresses?
Question 9. Which of the following is not an advantage of IPv6 versus IPv4?
- Larger address space
- Built-in security
- Supports static configuration
- NAT is unnecessary
Question 10. Which of the following is a valid IPv6 address?
- 5BA4:2391:0:0:4C3E
- 1080::8:800:200C:417A
- 24::5B1A::346C
- 5510:ABCD::34:1::2
Question 11. Which TCP flag can be the default response to a probe on a closed port?
Question 12. Which of the following is the description of a land attack?
- The local host source address occurs in the packet.
- Source and destination IP address/port are the same.
- An illegal TCP flag is found in the segment header.
- The attacker uses an undefined protocol number.
Question 13. What is the typical packet sequence for closing a TCP session?
- FIN, FIN ACK, RST
- FIN, ACK, FIN ACK, ACK
- FIN ACK, FIN, ACK, RST
- FIN, FIN ACK
Question 14. Which of the following is an element of the TCP header that can indicate that a connection has been established?
- Flags
- Stream index
- SEQ/ACK analysis
- Sequence number
Question 15. Of what category of attack is a DoS attack an example?
- Bad header information
- Single-packet attack
- Multiple-packet attack
- Suspicious data payload
Question 16. What uses mathematical calculations to compare routes based on some measurement of distance?
- Route summarization
- Link-state routing protocols
- Routing metrics
- Distance-vector routing protocols
Question 17. Which protocol that runs on Cisco routers shares information between Cisco devices?
Question 18. Which of the following is true about ACLs on Cisco routers?
- There is an implicit deny any statement at the end of the ACL.
- There is an explicit permit any statement at the beginning of the ACL.
- ACLs are processed in reverse order so place high priority statements last.
- ACLs bound to an interface apply to inbound and outbound traffic by default.
Question 19.19.Which of the following types of traffic does NOT travel through routers?
- DNS zone transfers
- ARP requests
- SNMP status information
- Network route information
Question 20. Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router?
Identifying hazardous air pollutants prior to 1990 amendment
: Using the efficiency criterion, carefully analyze the problem faced by the EPA in identifying haz- ardous air pollutants prior to the 1990 Amendments.
|
Data in the table.
: Which company is which? Explain how you identified each company from the data in the table.
|
Indicate whether each of the following accounts
: Indicate whether each of the following accounts normally has a debit or credit balance: Interest Receivable, Interest Revenue, Dividends
|
What is the probability of drawing a diamond card
: What is the probability (written as a percent) of drawing a Diamond card? What is the probability (written as a proportion) of drawing a face card
|
Type of firewall policy calls
: Which type of firewall policy calls for a firewall to deny all traffic by default?
|
Difference between systems analysis and systems design
: Illustrate the difference between systems analysis and systems design. What is the goal of each phase? What are the ramifications of finding flaws during the analysis phase or the design phase?
|
Prepare journal entries to record the issue of bond by angel
: Prepare journal entries to record the issue of the bonds by Angel on April 1, 2014, and the first two interest payments on October 1, 2014, and April 1, 2015.
|
Identify each event as asset source
: Identify each event as asset source (AS), asset use (AU), asset exchange (AE), or claims exchange (CE). Also identify the account to be debited and the account to be credited when the transaction is recorded.
|
Record each of the preceding events
: Collected $24,000 of cash in advance for services to be provided over the next 12 months.
|