Information Systems Chapter 10

Home > Preview

The flashcards below were created by user jerk7600 on FreezingBlue Flashcards.


  1. T/F: A border router can provide enhanced features to internal networks and help keep subnet traffic separate.
    False
  2. T/F: A firewall is a basic network security defense tool.
    True
  3. T/F: A network attacker wants to know IP addresses used on a network, remote access procedures, and weaknesses in network systems.
    True
  4. T/F: A network protocol governs how networking equipment interacts to deliver data across the network.
    True
  5. T/F: A packet-filtering firewall remembers information about the status of a network communication.
    False
  6. T/F: A subnet mask is a partition of a network based on IP addresses.
    False
  7. T/F: A wireless access point (WAP) is the connection between a wired and wireless network.
    True
  8. T/F: Another name for a border firewall is a DMZ firewall.
    False
  9. T/F: IP addresses are eight-byte addresses that uniquely identify every device on the network.
    False
  10. T/F: Implicit deny is when firewalls look at message addresses to determine whether a message is being sent around an unending loop.
    False
  11. T/F: Internet Control Message Protocol (ICMP) is a method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address.
    False
  12. T/F: Internet Small Computer System Interface (iSCSI) is a storage networking standard used to link data storage devices to networks using IP for its transport layer.
    True
  13. T/F: Network access control (NAC) works on wired and wireless networks.
    True
  14. T/F: TCP/IP is a suite of protocols that operates at both the Network and Transport layers of the OSI Reference Model.
    True
  15. T/F: The Data Link Layer of the OSI Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).
    True
  16. T/F: The OSI Reference Model is a theoretical model of networking with interchangeable layers.
    True
  17. T/F: The Physical Layer of the OSI Reference Model must translate the binary ones and zeros of computer language into the language of the transport medium.
    True
  18. T/F: The Transport Layer of the OSI Reference Model creates, maintains, and disconnects communications that take place between processes over the network.
    False
  19. T/F: The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.
    True
  20. T/F: The three main categories of network security risk are reconnaissance, eavesdropping, and denial of service.
    True
  21. The basic model for how you can build and use a network and its resources is known as the ________.
    A) Dynamic Host Configuration Protocol (DHCP)
    B) Open Systems Interconnection (OSI) reference model
    C) None of these
    D) International Organization for Standardization (ISO) model
    B) Open Systems Interconnection (OSI) reference model
    (this multiple choice question has been scrambled)
  22. The basic job of a ________ is to enforce an access control policy at the border of a network.
    A) Firewall
    B) Router
    C) Switch
    D) Access Point
    A) Firewall
    (this multiple choice question has been scrambled)
  23. A(n) ________ is a critical element in every corporate network today, allowing access to an organization's resources from almost anywhere in the world.
    A) None of these
    B) Dynamic Host Configuration Protocol (DHCP)
    C) Local area network (LAN)
    D) Wide area network (WAN)
    B) Dynamic Host Configuration Protocol (DHCP)
    (this multiple choice question has been scrambled)
  24. T/F: A secure virtual private network (VPN) creates an authenticated and encrypted channel across some form of public network.
    True
  25. _______ is a suite of protocols that was developed by the Department of Defense to provide a highly reliable and fault-tolerant network infrastructure.
    A) DHCP
    B) VPN
    C) PPPoE
    D) TCP/IP
    D) TCP/IP
    (this multiple choice question has been scrambled)
  26. A ________ is a device that interconnects two or more networks and selectively interchanges packets of data between them.
    A) Router
    B) Hub
    C) Switch
    D) LAN
    A) Router
    (this multiple choice question has been scrambled)
  27. Which simple network device helps to increase network performance by using the MAC address to send network traffic only to its intended destination?
    A) Switch
    B) Gateway
    C) Hub
    D) Router
    A) Switch
    (this multiple choice question has been scrambled)
  28. T/F: The three basic types of firewalls are packet filtering, application proxy, and stateful inspection.
    True
  29. What technology is the most secure way to encrypt wireless communications?
    A) WPA
    B) TCP
    C) WEP
    D) UDP
    A) WPA
    (this multiple choice question has been scrambled)
  30. T/F: IP addresses are assigned to computers by the manufacturer.
    False
  31. Which VPN technology allows users to initiate connections over the Web?
    A) ICMP
    B) IPSec
    C) SSL
    D) PPTP
    C) SSL
    (this multiple choice question has been scrambled)
  32. What layer of the OSI reference model is most commonly responsible for encryption?
    A) Presentation
    B) Application
    C) Transport
    D) Session
    A) Presentation
    (this multiple choice question has been scrambled)
  33. T/F: DHCP provides systems with their MAC addresses.
    False
  34. What firewall topology supports the implementation of a DMZ?
    A) Bastion host
    B) Border firewall
    C) Multilayered firewall
    D) Screened subnet
    D) Screened subnet
    (this multiple choice question has been scrambled)
  35. What technology allows you to hide the private IP address of a system from the Internet?
    A) NAT
    B) RADIUS
    C) SLL
    D) PPTP
    A) NAT
    (this multiple choice question has been scrambled)

Card Set Information

Author:
jerk7600
ID:
335983
Filename:
Information Systems Chapter 10
Updated:
2017-11-14 02:36:20
Tags:
information systems security
Folders:

Description:
Sucker
Show Answers:

Home > Flashcards > Print Preview