资源预览内容
第1页 / 共8页
第2页 / 共8页
第3页 / 共8页
第4页 / 共8页
第5页 / 共8页
第6页 / 共8页
第7页 / 共8页
第8页 / 共8页
亲,该文档总共8页全部预览完了,如果喜欢就下载吧!
资源描述
通信安全知识域练习题1. Which of the following does not allow for a workstation to get an IP address assigned?a) BOOTPb) RARPc) DHCPd) ICMP2. A Wide Area Network (WAN) may be privately operated for a specific user community, may support multiple communication protocols, or may provide network connectivity and services via:a) interconnected network segments (extranets, internets, and Virtual Private Networks).b) interconnected netBIOS segments (extranets, intranets, and Virtual Private Networks).c) interconnected netBIOS segments (extranets, internets, and Virtual Private Networks).d) interconnected network segments (extranets, intranets, and Virtual Private Networks).3. A proxy server should:a) Be connected directly to the external network.b) Have routing enabled.c) Be located behind a firewall.d) Allow access from external clients.4. Which of the following is true of Network-based ID systems?a) They commonly reside on a discrete network segment and monitor the traffic on that network segment.b) They commonly will not reside on a discrete network segment and monitor the traffic on that network segment.c) They commonly reside on a discrete network segment but do not monitor the traffic on that network segment.d) They commonly do not reside on a discrete network segment and monitor the traffic on that network segment.5. Which of the following error correction methods is more effective when bursts of errors may be present?a) Parity checkb) Cyclic redundancy checkc) Block sum checkd) Block chaining check6. Which of the following describe elements that create reliability and stability in networks and systems and which assures that connectivity is accessible when needed?a) Availabilityb) Acceptabilityc) confidentialityd) Integrity7. In stateful inspection firewalls, packets are queued and then:a) accessed at only one Open Systems Interconnect (OSI) layer.b) analyzed at all Open Systems Interconnect (OSI) layers.c) decapsulated at all Open Systems Interconnect (OSI) layers.d) encapsulated at all Open Systems Interconnect (OSI) layers.8. There is no good logical reason for not using a DMZ:a) If a company decides not to use one, they are ignorant of security risks or theyre just careless.b) If a company decides not to use one, they must have no Extranet connectionsc) If a company decides to use one, they must have only wireless connections.d) If a company decides not to use one, they HAVE A GOOD REASON as DMZ are useless9. Which cable technology refers to the CAT3 and CAT5 categories?a) Coaxial cablesb) Fiber Optic cablesc) Axial cablesd) Twisted Pair cables10. Which backup method is used if time and tape space is at an extreme premium?a) Incremental backup method.b) Differential backup method.c) Full backup method.d) Tape backup method.D D C A B A B A D A11. A TCP SYN attack:a) requires a synchronized effort by multiple attackers.b) takes advantage of the way a TCP session is established.c) may result in elevation of privileges.d) is not something system users would notice.B12. How would an IP spoofing attack be best classified?a) Session hijacking attackb) Passive attackc) Fragmentation attackd) Sniffing attackA13. Which of the following NAT firewall translation modes allows a large group of internal clients to share a single or small group of internal IP addresses for the purpose of hiding their identities?a) Static translationb) Load balancing translationc) Network redundancy translationd) Dynamic translationD14. The general philosophy for DMZs is that:a) any system on the DMZ can be compromized because its accessible from the Internet.b) any system on the DMZ cannot be compromized because its not accessible from the Internet.c) some systems on the DMZ can be compromized because they are accessible from the Internet.d) any system on the DMZ cannot be compromized because its by definition 100 percent safe and not accessible from the Internet.A15. A packet filtering firewall looks at the data packet to get information about the source and destination addresses of an incoming packet, the sessions communications protocol (TCP, UDP, or ICMP), and the source and destination application port for the:a) desired service.b) dedicated service.c) delayed service.d) distributed service.A16. CAT3 is an older specification with a:a) longer effective distance.b) shorter effective distance.c) longer effective strength.d) higher EMI protection.B17. Which of the following is true related to network sniffing?a) Sniffers allow an attacker to monitor data passing across a network.b) Sniffers alter the source address of a computer to disguise and exploit weak authentication methods.c) Sniffers take over network connections.d) Sniffers send IP fragments to a system that overlap with each other.A18. Which of the following includes noti
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号