Type of firewall policy calls

Assignment Help Financial Accounting
Reference no: EM13914637

Question 1. An activist can best be described as which of the following?

  • An unskilled programmer that spreads malicious scripts
  • Consider themselves seekers of knowledge
  • Use DoS attacks on websites with which they disagree
  • Deface websites by leaving messages for their friends to read

Question 2. Which type of firewall policy calls for a firewall to deny all traffic by default?

  • Permissive policy
  • Perimeter policy
  • Restrictive policy
  • Demilitarized policy

Question 3. What is a program that appears to do something useful but is actually malware?

  • Virus
  • Logic bomb
  • Trojan
  • Back door

Question 4. In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

  • Basic
  • Challenge/response
  • Biometrics
  • Signature

Question 5. Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

  • Malicious port scanning
  • Man-in-the-middle
  • Denial of service
  • Remote procedure call

Question 6. How large is the IPv6 address space?

  • 32 bits
  • 128 bits
  • 64 bits
  • 168 bits

Question 7. Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?

  • TTL
  • Fragment Offset
  • ECN
  • Options

Question 8.8.Which protocol is responsible for automatic assignment of IP addresses?

  • DNS
  • DHCP
  • FTP
  • SNMP

Question 9. Which of the following is not an advantage of IPv6 versus IPv4?

  • Larger address space
  • Built-in security
  • Supports static configuration
  • NAT is unnecessary

Question 10. Which of the following is a valid IPv6 address?

  • 5BA4:2391:0:0:4C3E
  • 1080::8:800:200C:417A
  • 24::5B1A::346C
  • 5510:ABCD::34:1::2

Question 11. Which TCP flag can be the default response to a probe on a closed port?

  • RST
  • URG
  • PSH
  • SYN

Question 12. Which of the following is the description of a land attack?

  • The local host source address occurs in the packet.
  • Source and destination IP address/port are the same.
  • An illegal TCP flag is found in the segment header.
  • The attacker uses an undefined protocol number.

Question 13. What is the typical packet sequence for closing a TCP session?

  • FIN, FIN ACK, RST
  • FIN, ACK, FIN ACK, ACK
  • FIN ACK, FIN, ACK, RST
  • FIN, FIN ACK

Question 14. Which of the following is an element of the TCP header that can indicate that a connection has been established?

  • Flags
  • Stream index
  • SEQ/ACK analysis
  • Sequence number

Question 15. Of what category of attack is a DoS attack an example?

  • Bad header information
  • Single-packet attack
  • Multiple-packet attack
  • Suspicious data payload

Question 16. What uses mathematical calculations to compare routes based on some measurement of distance?

  • Route summarization
  • Link-state routing protocols
  • Routing metrics
  • Distance-vector routing protocols

Question 17. Which protocol that runs on Cisco routers shares information between Cisco devices?

  • CDP
  • TCP
  • bootp
  • SSH

Question 18. Which of the following is true about ACLs on Cisco routers?

  • There is an implicit deny any statement at the end of the ACL.
  • There is an explicit permit any statement at the beginning of the ACL.
  • ACLs are processed in reverse order so place high priority statements last.
  • ACLs bound to an interface apply to inbound and outbound traffic by default.

Question 19.19.Which of the following types of traffic does NOT travel through routers?

  • DNS zone transfers
  • ARP requests
  • SNMP status information
  • Network route information

Question 20. Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router?

  • Console
  • AUX
  • Enable
  • TTY

Reference no: EM13914637

Questions Cloud

Identifying hazardous air pollutants prior to 1990 amendment : Using the efficiency criterion, carefully analyze the problem faced by the EPA in identifying haz- ardous air pollutants prior to the 1990 Amendments.
Data in the table. : Which company is which? Explain how you identified each company from the data in the table.
Indicate whether each of the following accounts : Indicate whether each of the following accounts normally has a debit or credit balance: Interest Receivable, Interest Revenue, Dividends
What is the probability of drawing a diamond card : What is the probability (written as a percent) of drawing a Diamond card? What is the probability (written as a proportion) of drawing a face card
Type of firewall policy calls : Which type of firewall policy calls for a firewall to deny all traffic by default?
Difference between systems analysis and systems design : Illustrate the difference between systems analysis and systems design. What is the goal of each phase? What are the ramifications of finding flaws during the analysis phase or the design phase?
Prepare journal entries to record the issue of bond by angel : Prepare journal entries to record the issue of the bonds by Angel on April 1, 2014, and the first two interest payments on October 1, 2014, and April 1, 2015.
Identify each event as asset source : Identify each event as asset source (AS), asset use (AU), asset exchange (AE), or claims exchange (CE). Also identify the account to be debited and the account to be credited when the transaction is recorded.
Record each of the preceding events : Collected $24,000 of cash in advance for services to be provided over the next 12 months.

Reviews

Write a Review

Financial Accounting Questions & Answers

  Financial statement analysis and preparation

Financial Statement Analysis and Preparation

  Shareholder of a company

Describe the ways that a person can become a shareholder of a company. Why Wal-Mart would split its stock?

  Financial and accounting principles

An understanding of financial and accounting principles can be a valuable tool for managers. While not all managers will find themselves calculating financial ratios or preparing annual financial data.

  Prepare a statement of cash flow using the direct method

Prepare a Statement of Cash Flow using the Direct Method and Prepare the Operations section of the Statement of Cash Flow using the Indirect Method.

  Financial accounting assignment

This assignment has one case study and two question apart from case study. Questions related to document Liquidation question and Company financial statements question - Torquay Limited

  Prepare general journal entries for goela

Prepare general journal entries for Goela Ltd

  Principles of financial accounting

Prepare the journal entry to record the acquisition of the assets.

  Prepare general journal entries to record the transactions

Prepare general journal entries to record the transactions, assuming use of the periodic inventory system

  Global reporting initiative

Compare the view espoused by the economist Milton Friedman about the social responsibilities of business with the views express by Stigler.

  Explain the iasb conceptual frameworks

Explain the IASB Conceptual Framework's perspective of users and their decisions.

  Determine the company''s financial statements

T he focus of the report is to determine the extent to which you are comfortable relying on the financial statements as presented by management .

  Computation of free cash flow

Computation of Free Cash Flow

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd