ITN 262 FINAL EXAM WITH COMPLETE SOLUTIONS 100% GUARANTEE PASS
4 keer bekeken 0 keer verkocht
Vak
ITN 262
Instelling
ITN 262
ITN 262 FINAL EXAM WITH COMPLETE SOLUTIONS 100% GUARANTEE PASS
How does DNS cache poisoning work? - Answer- b) The attacker transmits bogus DNS responses to the victim, or the victim's DNS server, containing the bogus information.
How have DDOS attacks affected DNS and hosts that rely on i...
ITN 262 FINAL EXAM WITH COMPLETE
SOLUTIONS 100% GUARANTEE PASS
How does DNS cache poisoning work? - Answer- b) The attacker transmits bogus DNS
responses to the victim, or the victim's DNS server, containing the bogus information.
How have DDOS attacks affected DNS and hosts that rely on it? Select all that apply. -
Answer- b) DDOS attacks on DNS servers for specific hosts have made it difficult for
some users to reach those hosts.
a) Partially successful attacks on root DNS servers have had little effect on Internet
traffic.
d) Botnets may have been used in some DNS DDOS attacks.
True or False? Randomized request are a part of the DNS Security Improvements. -
Answer- True
True or False? Though vulnerabilities exist, most DNS transactions take place without
trouble or interference. - Answer- True
DNS security improvements include which of the following? Select all that apply. -
Answer- d) Limited access to resolvers
c) Distributed DNS servers
b) Randomized requests
A firewall gateway for a household or small business LAN contains several of the
following features. Select all that appear in a typical gateway. - Answer- c) DHCP
protocol
b) Share a single IP address assigned by the ISP among multiple hosts inside the
network
A simple gateway as described in Section 12.4 can filter on a variety of packet contents.
Select all types of packets listed below that a simple gateway can filter. - Answer- e)
Broadcasts
c) ICMP
d) IP addresses
b) Web traffic
True or False? The purpose of a gateway firewall is to block potentially hostile traffic
from reaching the internal LAN. - Answer- True
,True or False? Hosts behind a network address translation (NAT) gateway are typically
assigned local IP addresses. - Answer- True
Packet filtering looks at any packet header and filters on all of the following values,
except: - Answer- a) email address.
We are implementing a product with local authentication on the device. What is included
in the security boundary? - Answer- a) Everything from the point where the credential is
entered to the checking mechanism and the authentication database
We need to implement services on several servers, and we wish to use the same login
credentials for all of them. Which authentication patterns are most effective for this?
Select all that apply. - Answer- c) Indirect authentication
d) Off-line authentication
Which authentication pattern may be implemented with no cryptography at all? -
Answer- a) Local authentication
We are implementing a server with direct authentication. What is included in the security
boundary? - Answer- b) The server itself, including its credential checking mechanism
and the authentication database
We are implementing a server with off-line authentication. What is included in the
security boundary? - Answer- d) The server itself, which does not include an
authentication database
A network's topology refers to the structure of its: - Answer- b) connections.
Modern internet technology evolved from research on: - Answer- d) the ARPANET.
Highway systems of driveways, local roads, and national roads are networks for
automobiles, much like the internet is a network for data traffic. Both types of network
share some similarities. Select the most appropriate similarities from those listed below.
- Answer- d) The networks may be used for private, public service, and commercial
traffic.
c) There is no single organization responsible for all network elements.
b) The networks connect their elements across many different types of links.
The ______ was carefully designed so that the network protocols worked seamlessly
across a broad range of computing equipment. - Answer- ARPANET
A router is traditionally called a(n) ________. - Answer- gateway
, True or False? The internet layer of every such protocol stack contains a routing table
that chooses a network and/or MAC address for the outgoing packet. - Answer- True
True or False? A router changes everything past the IP header. - Answer- False
Which of the following explanations of how packet addresses are used during routing is
most accurate? - Answer- b) The packet's destination IP address is used to select the
packet's next MAC address.
True or False? When internet technology connects two networks with separate link
layers together, each individual network is called a subnet. - Answer- True
True or False? The time to live (TTL) field in an IP header counts the number of hops a
packet takes through routers on its way to its destination. - Answer- True
True or False? Each site's router contains the complete path followed by every packet
arriving at that site. - Answer- False
Internet routing: - Answer- c) makes routing decisions one at a time as a packet crosses
individual networks.
Routing devices on the early ARPANET were called: - Answer- b) IMPs.
Handles a cluster of networks, usually for paying customers - Answer- Internet Service
Provider (ISP)
Establishes protocol standards used on the internet - Answer- Internet Engineering
Task Force (IETF)
Organizes the internet into clusters of networks for routing - Answer- Autonomous
system (AS)
Routes network traffic between ASes - Answer- Border routers
An autonomous system (AS): - Answer- b) uses border routers to connect one AS to
another.
a) handles two types of routing: interior and exterior.
Each _______ is essentially a(n) _______ that handles routing between its networking
customers. - Answer- AS; ISP
True or False? Exterior routing relies on interior routers. - Answer- False
Which interface provides a well-known way of addressing hosts and processes on a
computer and of writing client or server software? - Answer- Socket interface
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
√ Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €13,02. Je zit daarna nergens aan vast.