IS3340 CHAPTER 9 Flashcards Preview

IS3340 SEC. STRAT. IN WINDOWS PLATFORM & APPS. > IS3340 CHAPTER 9 > Flashcards

Flashcards in IS3340 CHAPTER 9 Deck (51):
1

Computers that run application programs on behalf of remote user is called ___?

APPLICATION SERVERS

2

Network cabling that consists of a single copper conductor surrounded with a plastic sheath, then a braided copper shield, and then the external insulation is called ___?

COAXIAL CABLE

3

The adapters and wires (sometimes) that connect components together is called ___?
Not all connection methods use wires. Wireless devices use radio waves to transmit data instead of wires.

CONNECTION MEDIA

4

An untrusted network created by using one or more firewalls to separate an untrusted network from a trusted network is called ___?

DEMILITARIZED ZONE (DMZ)

5

An attack that sends a large volume of network messages that end up flooding the network and making it unusable for legitimate traffic is called ___?

DENIAL OF SERVICE (DoS)

6

A SoS attack in which the controller instructs one or more compromised computers to flood a network with packets is called ___?

DISTRIBUTED DENIAL OF SERVICE (DDoS)

7

Network cabling that consists of a glass core surrounded by several layers of protective materials is called ___?

FIBER OPTIC CABLE

8

A computer or hardware device that has one or more connected hard disk drives, a network interface, and software to provide network access to files and folders on the attached disks is called ___?

FILE SERVER

9

A network device that connects two or more separate networks that use different protocols is called ___?

GATEWAY

10

A network device with several connectors, or ports, that allows multiple network cables to attach to it is called ___?

HUB

11

A secure application layer protocol used to transfer encrypted content between Web browsers and Web servers is called ___?

HYPERTEXT TRANSPORT PROTOCOL (HTTP)

12

This defines standards for wireless local area network (WLAN) communication protocols and is called ___?

IEEE802.11

13

Defines standards for many aspects of computing and communications. This is called ____?

INSTITUTE OF ELECTRICAL AND ELECTRONIC ENGINEERS (IEEE)

14

This connects a LAN to the Internet and is called ___?

INTERNET GATEWAY

15

A network that covers a small physical area, such as an office or building is called ___?

LOCAL AREA NETWORK (LAN)

16

Any resource attached to a local computer--the same computer to which the user has logged on is called ___?

LOCAL RESOURCE

17

A network that connects two or more LANs but does not span an area larger than a city or town is called ___?

METROPOLITAN AREA NETWORK (MAN)

18

A collection of computers and devices connected by some connection media is called a ___?

NETWORK

19

A technique used in many firewalls that translates internal IP addresses into an external IP address is called ___? This feature hides the true IP address of internal computers from outside nodes.

NETWORK ADDRESS TRANSLATION (NAT)

20

Hardware devices that connect other devices and computers using connection media is called ___?

NETWORKING DEVICES

21

Any computer or device connected to a network is called a ___?

NODE

22

A generic description for how computers use multiple layers of protocol rules to communicate across a network is called ___?
This reference model defines seven different layers of communication.

OPEN SYSEM INTERCONNECTION (OSI) REFERENCE MODEL

23

In the context of network protocols, a numeric identifier that programs use to classify network messages is called ___?

PORTS

24

A computer or network device that provides the interface between the network and one or more printers is called ___?

PRINT SERVER

25

A set of rules that govern communication is called ___?

PROTOCOLS

26

Any resource attached to another computer on a network that is different from the computer to which the user is logged on is called ___?

REMOTE RESOURCES

27

A network device that examines the destination address and then forwards the packet to the correct outbound port is called ___?

ROUTER

28

Hardware that provides one or more services to users, such as server computers, printers, and network storage devices is called ___?

SERVER COMPUTERS AND SERVICES DEVICES

29

A uniques identifier for a wireless network is called ____?

SERVICE SET IDENTIFIER (SSID)

30

Network cabling that generally consists of two or four pairs of wires with a foil shielding around each pair to reduce external electrical and redo interference is called ___?
Pairs of wires are twisted around each other to reduce interference with other pairs.

SHIELDED TWISTED PAIR (STP)

31

A network hardware device that forwards input it receives only to the appropriate output port is called ___?

SWITCH

32

A combination of two separate protocols commonly used in Internet network communication is called ___?

(TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP)

33

Network cabling that generally consists of two or more pairs of wires is called ___?
Pairs of wires are twisted around each other to reduce interference with other pairs.

UNSHIELDED TWISTED PAIR (UTP)

34

A network that connects multiple LANs and WANs and spans very large areas, including multiple country coverage is called ___?

WIDE AREA NETWORK (WAN)

35

A long-running program that performs a specific set of functions, such as a firewall, database server, or a Web server is called ___?

WINDOWS SERVICE

36

A LAN in which computers and devices communicate using radio frequency transmissions is called ___?

WIRELESS LOCAL AREA NETWORK

37

1. A ___ is a network that generally spans several city blocks.

Metropolitan Area Network (MAN)

38

2. A local resource is any resource connected to the local LAN.
TRUE OR FALSE

FALSE

39

3. Which of the following devices repeats input received to all ports?

1. Switch
2. Hub
3. Gateway
4. Router

Hub

40

4. ___ cabling provides very good protection from interference but is difficult to install.

Coaxial

41

5. Even the newest wireless protocols are slower than using high quality physical cable.
TRUE OR FALSE

TRUE

42

6. Which LAN device commonly has the ability to filter packets and deny traffic based on the destination address?

1. Router
2. Gateway
3. Hub
4. Switch

Gateway

43

7. A ___ is an untrusted network that contains Internet-facing servers and is separated from your trusted network by at least one firewall.

Demilitarized Zone (DMZ)

44

8. Which network device feature provides the ability to hide internal network node addresses?

1. DMZ
2. NAT
3. STP
4. OSI

NAT

45

9. Which network layer reference model includes four layers to describe how computers use multiple layers of protocol rules to communicate across a network?

1. IEEE
2. IPSec
3. UDP
4. TCP/IP

TCP/IP

46

10. Which of the following actions is NOT an effective way to secure Windows services that you do not use>

1. Stop it
2. Disable it
3. Block it
4. Remove it

Block it

47

11. You should disable the ___ broadcast to make wireless networks hard to discover.

1. SSID
2. NAT
3. MAC
4. WPA

SSID

48

12. A successful DoS attack violates which property of the A-I-C Triad?

1. Availability
2. Integrity
3. Consistency
4. Confidentiality

Availability

49

13. Where must sensitive data only appear encrypted to ensure its confidentiality? (Select two)

1. While in use in the Workstation
2. During transmission over the network
3. As it is stored on disk
4. In memory

During transmission over the network
&
As it is stored on disk

50

14. Which authentication protocol does Windows Server 2008 use as a default?

1. NTLM
2. Kerberos
3. WPA
4. NAT

Kerberos

51

15. What can some firewalls do to attempt to stop a DoS attack in progress?

1. Alert an attack responder
2. Log all traffic coming from the source of the attack
3. Terminate any connections with the source of the attack
4. Reset all connections

Terminate any connections with the source of the attack