Saint COM530 module 2 quiz

Question # 00041971 Posted By: neil2103 Updated on: 01/18/2015 01:22 AM Due on: 01/24/2015
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image
Question 1.1.An activist can best be described as which of the following? (Points : 5)





Question 2.2.Which type of firewall policy calls for a firewall to deny all traffic by default? (Points : 5)





Question 3.3.What is a program that appears to do something useful but is actually malware? (Points : 5)





Question 4.4.In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated? (Points : 5)





Question 5.5.Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications? (Points : 5)





Question 6.6.How large is the IPv6 address space? (Points : 5)





Question 7.7.Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped? (Points : 5)





Question 8.8.Which protocol is responsible for automatic assignment of IP addresses? (Points : 5)





Question 9.9.Which of the following is not an advantage of IPv6 versus IPv4? (Points : 5)





Question 10.10.Which of the following is a valid IPv6 address? (Points : 5)





Question 11.11.Which TCP flag can be the default response to a probe on a closed port? (Points : 5)





Question 12.12.Which of the following is the description of a land attack? (Points : 5)





Question 13.13.What is the typical packet sequence for closing a TCP session? (Points : 5)





Question 14.14.Which of the following is an element of the TCP header that can indicate that a connection has been established? (Points : 5)





Question 15.15.Of what category of attack is a DoS attack an example? (Points : 5)





Question 16.16.What uses mathematical calculations to compare routes based on some measurement of distance? (Points : 5)





Question 17.17.Which protocol that runs on Cisco routers shares information between Cisco devices? (Points : 5)





Question 18.18.Which of the following is true about ACLs on Cisco routers? (Points : 5)





Question 19.19.Which of the following types of traffic does NOT travel through routers? (Points : 5)





Question 20.20.Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router? (Points : 5)





Dot Image
Tutorials for this Question
  1. Tutorial # 00040756 Posted By: neil2103 Posted on: 01/18/2015 01:23 AM
    Puchased By: 4
    Tutorial Preview
    are the same. An illegal TCP flag is found in ...
    Attachments
    Solution-00040756.zip (88 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    zo...57 Rating Amazing tutorial experience 11/30/2016

Great! We have found the solution of this question!

Whatsapp Lisa