Question
Plz answer 27 to 40
flooding the network with 27. Which of the following is a type of denial-of-service attack that involves broadcast messages that contain a spoofed source address of an intended victim? a. packet storm b. broadcast flood c. smurf attack d. half-open SYN attack 28. When would you most likely NOT choose to use a leased line connection? a. when high-quality, 24/7 access is needed b. for mission critical applications c. when fast upstream as well as downstream communications is required d. when a nondedicated link is needed for backups 29. Where should a NIDS be placed to protect the entire network? a. datacenter b. intermediate distribution frame c. demilitarized zone d. internal LAN 30. What is the decimal equivalent to the binary number 11100000? a. 98 b. 160 c. 196 d. 224 31. Which of the following is a common link-state protocol? a. OSPF b. RIPv2 c. EIGRP d. BGP 32. Which of the following is the correct order of the layers of the OSI model from layer 1 to layer 7? a. Application, Presentation, Session, Transport, Network, Data Link, Physical b. Application, Session, Transport, Presentation, Network, Data Link, Physical c. Physical, Data Link, Network, Transport, Session, Presentation, Application d. Physical, Session, Network, Data Link, Transport, Presentation, Application 33. Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps What does this mean?
34. The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have? a. Primary Rate Interface (PRI) b. Basic Rate Interface (BRI) c. Basic Rate Extended (BRE) d. Asynchronous Transfer Mode (ATM) 35. What type of device should you install as a decoy to lure potential attackers? a. honeypot b. Trojan c. IPS d. VPN 36. Which is the IEEE standard that sets the standards for wireless networking? a. 802.16 b. 802.3 с. 802.15 d. 802.11 37. Which facet of securing access to network data makes data unusable to anyone except authorized users? a. encryption b. authentication c. malware protection d. security devices 38. What is the local loop, or last mile? a the connection used between central offices b. cable between the customer premise equipment and a PC c. a line used by ISPs for testing T-carrier signals d. the connection between the demarcation point and the CO 39. Which protocol is used to encrypt data as it travels a network? a. EFS b. Kerberos c. IPsec d. SMB 40. What can firewalls do to help ensure that a packet is denied if its not part of an ongoing legitimate conversation? Page 5
0 0
Add a comment Improve this question Transcribed image text
Answer #1

27. Which of the following is a type of denial-of-service attack that involves broadcast messages that flooding the network containing a spoofed source address of an intended victim?

Ans. C)Smurf attack

The Smurf attack is a type of distributed denial-of-service attack where large numbers ) packets with the victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.

28. When would you most likely NOT choose to use a leased line connection?

Ans.d)when a nondedicated link is needed for backups

Since lased-line is very expensive for backup we can use inexpensive ISP connection.

29. Where should a NIDS be placed to protect the entire network?

Ans.a)intermediate distribution frame

30. What is the decimal equivalent to the binary number 11100000?

Ans. d)224

(11100000)2 = (224)10

31. Which of the following is a common link-state protocol?

Ans. a)OSPF (Open Shortest Path first algorithm)

32. Which of the following is the correct order of the layers of the OSI model from layer 1 to layer 7

Ans.  c. Physical, Data Link, Network, Transport, Session, Presentation, Application

33. Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps What does this mean?

Ans. 1.54 Mbps is the guaranteed minimum transmission rate

34. The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?

Ans.  a. Basic Rate Interface (BRI)

35. What type of device should you install as a decoy to lure potential attackers?

Ans. a) Honeypot

36. Which is the IEEE standard that sets the standards for wireless networking?

Ans. d)802.11

37. Which facet of securing access to network data makes data unusable to anyone except authorized users?

Ans. a)encryption

38. What is the local loop, or last mile?

Ans. d)connection between demarcation point and co (central office)

39. Which protocol is used to encrypt data as it travels a network?

Ans. c)IPSec

40.  What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?

Ans. Stateful Packet Inspection.

Add a comment
Know the answer?
Add Answer to:
Plz answer 27 to 40 flooding the network with 27. Which of the following is a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data...

    seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data 13. Which components work at Layer I of the os La a. Which layer of the 0Sl model makes sure ls in a readable format for the Application layer A. Application layer B. Presentation layer Ex do C. Session layer D. Transport layer 9. At which layer of the TCP/1P model are UDP 14. Andalyn says complete 48-bit MAC ed to NIC manufacturers from...

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • 21. App (application software) requires a member of transport services to function. Which choice best describes...

    21. App (application software) requires a member of transport services to function. Which choice best describes the transport service required by an app? a. Reliable data transfer and long delay in transmission b. Good throughput and data integrity c. Data secunty and long delay in transmission d. long delay in transmission and poor timing 22. This transport protocol does not provide flow control reliability, congestion control, time or security. Which transport protocol is it? a. File transfer protocol b. Transmission...

  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • Topic: TCP/IP T Time Remaining 57 minutes Application 6 Presentation Application Session 4 Transport Transport Internet...

    Topic: TCP/IP T Time Remaining 57 minutes Application 6 Presentation Application Session 4 Transport Transport Internet Network Interface TCP/IP Network Data Link Physical OSI Reference Model TCP layers (true or false true false- MAC addresses are handled at the Application layer true false- Size of the data packets is done at the Insternet layer true false- the Network Cnternet) Inyer is involved with couting of messages true false Switching ss done at the latermet layes THE

  • 1. How many hosts can reside on a single Class C network? 1. 65535 2. 256...

    1. How many hosts can reside on a single Class C network? 1. 65535 2. 256 3. 254 4. 127 2.   Select the invalid IP address 1. 95.31.0.15 2. 143.256.11.2 3. 24.123.33.60 4. 135.10.243.1 3. What layer in the TCP/IP protocol suite would a Web Browser reside? 1. Data Link 2. Application 3. Network 4. Physical 4. If I have developed a new type of network interface device - one that uses a new wireless technology, which layer of the...

  •  To begin, draw the OSI model on the left side of your paper, being certain to...

     To begin, draw the OSI model on the left side of your paper, being certain to label each layer. 2. Above the top layer of the OSI model, write Software. Then, below the bottom layer, write Network. 3. Suppose the software issues a message to the network that is 3400 bytes in size. Next to the Application layer, Presentation layer, and Session layer, draw the PDU for this message as it appears at each of these layers (adding the appropriate...

  • Determine which layer(s) of the seven layers of the OSI model has (have) the following functions....

    Determine which layer(s) of the seven layers of the OSI model has (have) the following functions. List all the layers if more than one layer have the function, e.g. PL (Physical Layer), DL (Data Link Layer), NL (Network Layer), TL (Transport Layer), & AL (Application Layer – OSI layers 5 - 7). (10 points – 1 points for each sub-question) modulation flow controls error detection & error controls multiplexing collision detection addressing end-to-end network packet delivery connection-oriented or connectionless segmentation...

  • Which of the following is an incorrect statement? A. http is a stateless protocol B. http...

    Which of the following is an incorrect statement? A. http is a stateless protocol B. http is a request respond protocol C. http server is the same as web server D. http server deals with the functions of 4 layers from OSI reference model; application layer, session layer, presentation layer, and network layer

  • Subject: Network Security 2. Secure Socket Layer protocol (SSL): (a) Compare the Secure Socket Layer protocol...

    Subject: Network Security 2. Secure Socket Layer protocol (SSL): (a) Compare the Secure Socket Layer protocol (SSL) to IPsec. Show where would you place both in the Internet protocol stack. Which one is better suited for credit card transactions? [10 marks] (b) Is a man-in-the-middle attack possible on the Secure Socket Layer protocol (SSL)? [10 marks] (c) What is the difference between session and connection and why do we need both? [5 marks]

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT