Warning: include(/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php): failed to open stream: No such file or directory in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95

Warning: include(): Failed opening '/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95
Saint COM530 module 2 quiz – RoyalCustomEssays

Saint COM530 module 2 quiz

ACC 317 Week 1 Homework
July 2, 2018
FIN370 MyFinanceLab Week-3 NEW – 2015
July 2, 2018

Question 1.1.An activist can best be described as which of the following? (Points : 5) An unskilled programmer that spreads malicious scripts Consider themselves seekers of knowledge Use DoS attacks on websites with which they disagree Deface websites by leaving messages for their friends to readQuestion 2.2.Which type of firewall policy calls for a firewall to deny all traffic by default? (Points : 5) Permissive policy Perimeter policy Restrictive policy Demilitarized policyQuestion 3.3.What is a program that appears to do something useful but is actually malware? (Points : 5) Virus Logic bomb Trojan Back doorQuestion 4.4.In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated? (Points : 5) Basic Challenge/response Biometrics SignatureQuestion 5.5.Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications? (Points : 5) Malicious port scanning Man-in-the-middle Denial of service Remote procedure callQuestion 6.6.How large is the IPv6 address space? (Points : 5) 32 bits 128 bits 64 bits 168 bitsQuestion 7.7.Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped? (Points : 5) TTL Fragment Offset ECN OptionsQuestion 8.8.Which protocol is responsible for automatic assignment of IP addresses? (Points : 5) DNS DHCP FTP SNMPQuestion 9.9.Which of the following is not an advantage of IPv6 versus IPv4? (Points : 5) Larger address space Built-in security Supports static configuration NAT is unnecessaryQuestion 10.10.Which of the following is a valid IPv6 address? (Points : 5) 5BA4:2391:0:0:4C3E 1080::8:800:200C:417A 24::5B1A::346C 5510:ABCD::34:1::2Question 11.11.Which TCP flag can be the default response to a probe on a closed port? (Points : 5) RST URG PSH SYNQuestion 12.12.Which of the following is the description of a land attack? (Points : 5) The local host source address occurs in the packet. Source and destination IP address/port are the same. An illegal TCP flag is found in the segment header. The attacker uses an undefined protocol number.Question 13.13.What is the typical packet sequence for closing a TCP session? (Points : 5) FIN, FIN ACK, RST FIN, ACK, FIN ACK, ACK FIN ACK, FIN, ACK, RST FIN, FIN ACKQuestion 14.14.Which of the following is an element of the TCP header that can indicate that a connection has been established? (Points : 5) Flags Stream index SEQ/ACK analysis Sequence numberQuestion 15.15.Of what category of attack is a DoS attack an example? (Points : 5) Bad header information Single-packet attack Multiple-packet attack Suspicious data payloadQuestion 16.16.What uses mathematical calculations to compare routes based on some measurement of distance? (Points : 5) Route summarization Link-state routing protocols Routing metrics Distance-vector routing protocolsQuestion 17.17.Which protocol that runs on Cisco routers shares information between Cisco devices? (Points : 5) CDP TCP bootp SSHQuestion 18.18.Which of the following is true about ACLs on Cisco routers? (Points : 5) There is an implicit deny any statement at the end of the ACL. There is an explicit permit any statement at the beginning of the ACL. ACLs are processed in reverse order so place high priority statements last. ACLs bound to an interface apply to inbound and outbound traffic by default.Question 19.19.Which of the following types of traffic does NOT travel through routers? (Points : 5) DNS zone transfers ARP requests SNMP status information Network route informationQuestion 20.20.Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router? (Points : 5) Console AUX Enable TTY

Place Order