27. Which of the following is a type of denial-of-service attack that involves broadcast messages that flooding the network containing a spoofed source address of an intended victim?
Ans. C)Smurf attack
The Smurf attack is a type of distributed denial-of-service attack where large numbers ) packets with the victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.
28. When would you most likely NOT choose to use a leased line connection?
Ans.d)when a nondedicated link is needed for backups
Since lased-line is very expensive for backup we can use inexpensive ISP connection.
29. Where should a NIDS be placed to protect the entire network?
Ans.a)intermediate distribution frame
30. What is the decimal equivalent to the binary number 11100000?
Ans. d)224
(11100000)2 = (224)10
31. Which of the following is a common link-state protocol?
Ans. a)OSPF (Open Shortest Path first algorithm)
32. Which of the following is the correct order of the layers of the OSI model from layer 1 to layer 7
Ans. c. Physical, Data Link, Network, Transport, Session, Presentation, Application
33. Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps What does this mean?
Ans. 1.54 Mbps is the guaranteed minimum transmission rate
34. The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?
Ans. a. Basic Rate Interface (BRI)
35. What type of device should you install as a decoy to lure potential attackers?
Ans. a) Honeypot
36. Which is the IEEE standard that sets the standards for wireless networking?
Ans. d)802.11
37. Which facet of securing access to network data makes data unusable to anyone except authorized users?
Ans. a)encryption
38. What is the local loop, or last mile?
Ans. d)connection between demarcation point and co (central office)
39. Which protocol is used to encrypt data as it travels a network?
Ans. c)IPSec
40. What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?
Ans. Stateful Packet Inspection.
Plz answer 27 to 40 flooding the network with 27. Which of the following is a...
seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data 13. Which components work at Layer I of the os La a. Which layer of the 0Sl model makes sure ls in a readable format for the Application layer A. Application layer B. Presentation layer Ex do C. Session layer D. Transport layer 9. At which layer of the TCP/1P model are UDP 14. Andalyn says complete 48-bit MAC ed to NIC manufacturers from...
1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...
21. App (application software) requires a member of transport services to function. Which choice best describes the transport service required by an app? a. Reliable data transfer and long delay in transmission b. Good throughput and data integrity c. Data secunty and long delay in transmission d. long delay in transmission and poor timing 22. This transport protocol does not provide flow control reliability, congestion control, time or security. Which transport protocol is it? a. File transfer protocol b. Transmission...
Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....
Topic: TCP/IP T Time Remaining 57 minutes Application 6 Presentation Application Session 4 Transport Transport Internet Network Interface TCP/IP Network Data Link Physical OSI Reference Model TCP layers (true or false true false- MAC addresses are handled at the Application layer true false- Size of the data packets is done at the Insternet layer true false- the Network Cnternet) Inyer is involved with couting of messages true false Switching ss done at the latermet layes THE
1. How many hosts can reside on a single Class C network? 1. 65535 2. 256 3. 254 4. 127 2. Select the invalid IP address 1. 95.31.0.15 2. 143.256.11.2 3. 24.123.33.60 4. 135.10.243.1 3. What layer in the TCP/IP protocol suite would a Web Browser reside? 1. Data Link 2. Application 3. Network 4. Physical 4. If I have developed a new type of network interface device - one that uses a new wireless technology, which layer of the...
To begin, draw the OSI model on the left side of your paper, being certain to label each layer. 2. Above the top layer of the OSI model, write Software. Then, below the bottom layer, write Network. 3. Suppose the software issues a message to the network that is 3400 bytes in size. Next to the Application layer, Presentation layer, and Session layer, draw the PDU for this message as it appears at each of these layers (adding the appropriate...
Determine which layer(s) of the seven layers of the OSI model has (have) the following functions. List all the layers if more than one layer have the function, e.g. PL (Physical Layer), DL (Data Link Layer), NL (Network Layer), TL (Transport Layer), & AL (Application Layer – OSI layers 5 - 7). (10 points – 1 points for each sub-question) modulation flow controls error detection & error controls multiplexing collision detection addressing end-to-end network packet delivery connection-oriented or connectionless segmentation...
Which of the following is an incorrect statement? A. http is a stateless protocol B. http is a request respond protocol C. http server is the same as web server D. http server deals with the functions of 4 layers from OSI reference model; application layer, session layer, presentation layer, and network layer
Subject: Network Security 2. Secure Socket Layer protocol (SSL): (a) Compare the Secure Socket Layer protocol (SSL) to IPsec. Show where would you place both in the Internet protocol stack. Which one is better suited for credit card transactions? [10 marks] (b) Is a man-in-the-middle attack possible on the Secure Socket Layer protocol (SSL)? [10 marks] (c) What is the difference between session and connection and why do we need both? [5 marks]