ISSC457 week 3 and week 4 Quizzes

Question 1 (5 points)
Question 1 options:
A
is a network-layer device or software application that determines the next network point to which a data packet should be forwarded in a packet-switched network.
Question 2 (5 points)
Question 2 options:
A
is a database that stores the most efficient routes to particular network destinations.
Question 3 (5 points)
Question 3 options:
(RIP) is a protocol used to manage router information within a self-contained network.
Question 4 (5 points)
Question 4 options:
A
attack renders a router unusable for network traffic by overloading the router's resources so that no one can access it.
Question 5 (5 points)
Question 5 options:
The routing table must be reviewed by using the command show ip route.
Question 6 (5 points)
Question 6 options:
The network topology and access control list must be examined thoroughly in a theft-of-information incident.
Question 7 (5 points)
Question 7 options:
incidents are one of the most common incidents, and the investigator must behave in a clinical manner while handling them.
Question 8 (5 points)
Question 8 options:
Every step taken during a router investigation must be recorded.
Question 9 (5 points)
Question 9 options:
: Console sessions are recorded in this type of logging.
Question 10 (5 points)
Question 10 options:
enables users to see and learn about Internet security and their network traffic.
Question 11 (5 points)
Question 11 options:
is a term derived from the phrase electronic mail.
Question 12 (5 points)
Question 12 options:
(SMTP) is a Internet protocol for transmitting e-mail over IP networks. An SMTP server listens on port 25 and handles all outgoing e-mail.
Question 13 (5 points)
Question 13 options:
version 3 (POP3) is an Internet protocol used to retrieve e-mail from a mail server.
Question 14 (5 points)
Question 14 options:
(IMAP) is an Internet protocol designed for accessing e-mail on a mail server. IMAP servers are similar to POP3 servers.
Question 15 (5 points)
Question 15 options:
is the intentional act of sending multiple copies of identical content to the same recipient.
Question 16 (5 points)
Question 16 options:
The flurry of junk mail, often sent by accident, is a
.
Question 17 (5 points)
Question 17 options:
is the willful act of stealing someone's identity for monetary benefits.
Question 18 (5 points)
Question 18 options:
A
is a message that is sent successively to several e-mail users.
Question 19 (5 points)
Question 19 options:
is the process of altering e-mail headers so that an e-mail appears to be from someone or somewhere other than the original source.
Question 20 (5 points)
Question 20 options:
analyzes e-mail headers and provides the IP address of the machine that sent the e-mail.

-
Rating:
5/
Solution: ISSC457 week 3 and week 4 Quizzes