Cash-back offer from May 2nd to 7th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 15.00

Saint COM530 module 2 quiz

Question posted by
Online Tutor Profile
request

Question 1.1. An activist can best be described as which of the following? (Points : 5)

An unskilled programmer that spreads malicious scripts

Consider themselves seekers of knowledge

Use DoS attacks on websites with which they disagree
Deface websites by leaving messages for their friends to read

Question 2.2. Which type of firewall policy calls for a firewall to deny all traffic by default? (Points : 5)

Permissive policy

Perimeter policy

Restrictive policy
Demilitarized policy

Question 3.3.What is a program that appears to do something useful but is actually malware? (Points : 5)

Virus

Logic bomb

Trojan

Back door

Question 4.4.In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated? (Points : 5)

Basic

Challenge/response

Biometrics

Signature

Question 5.5.Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications? (Points : 5)

Malicious port scanning

Man-in-the-middle

Denial of service

 Remote procedure call

Question 6.6.How large is the IPv6 address space? (Points : 5)

32 bits

128 bits

64 bits

168 bits

Question 7.7.Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped? (Points : 5)

TTL

Fragment Offset

ECN

Options

Question 8.8.Which protocol is responsible for automatic assignment of IP addresses? (Points : 5)

DNS

DHCP

FTP

SNMP

Question 9.9.Which of the following is not an advantage of IPv6 versus IPv4? (Points : 5)

Larger address space

Built-in security

Supports static configuration

NAT is unnecessary

Question 10.10.Which of the following is a valid IPv6 address? (Points : 5)

5BA4:2391:0:0:4C3E

1080::8:800:200C:417A

24::5B1A::346C

5510:ABCD::34:1::2

Question 11.11.Which TCP flag can be the default response to a probe on a closed port? (Points : 5)

RST

URG

PSH

SYN

Question 12.12.Which of the following is the description of a land attack? (Points : 5)

The local host source address occurs in the packet.

Source and destination IP address/port are the same.

An illegal TCP flag is found in the segment header.

The attacker uses an undefined protocol number.

Question 13.13.What is the typical packet sequence for closing a TCP session? (Points : 5)

 FIN, FIN ACK, RST

 FIN, ACK, FIN ACK, ACK

FIN ACK, FIN, ACK, RST

FIN, FIN ACK

Question 14.14.Which of the following is an element of the TCP header that can indicate that a connection has been established? (Points : 5)

Flags

Stream index

SEQ/ACK analysis

Sequence number

Question 15.15.Of what category of attack is a DoS attack an example? (Points : 5)

Bad header information

Single-packet attack

Multiple-packet attack

Suspicious data payload

Question 16.16.What uses mathematical calculations to compare routes based on some measurement of distance? (Points : 5)

 Route summarization

Link-state routing protocols

Routing metrics

Distance-vector routing protocols

Question 17.17.Which protocol that runs on Cisco routers shares information between Cisco devices? (Points : 5)

CDP

TCP

bootp

SSH

Question 18.18.Which of the following is true about ACLs on Cisco routers? (Points : 5)

There is an implicit deny any statement at the end of the ACL.

There is an explicit permit any statement at the beginning of the ACL.

ACLs are processed in reverse order so place high priority statements last.

ACLs bound to an interface apply to inbound and outbound traffic by default.

Question 19.19.Which of the following types of traffic does NOT travel through routers? (Points : 5)

 DNS zone transfers

ARP requests

SNMP status information

Network route information

Question 20.20.Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router? (Points : 5)

Console

AUX

Enable

TTY

 

 

Available Answer
$ 15.00

[Solved] Saint COM530 module 2 quiz

  • This solution is not purchased yet.
  • Submitted On 01 Dec, 2016 01:47:21
Answer posted by
Online Tutor Profile
solution
Question 1.1. An activist can best be described as which of the following? (Points : 5) An unskilled programmer that spreads malicious scripts Consider themselves seekers of knowledge Use DoS attacks on websites with which they disagree Deface websites by leaving messages for their friends to read Question 2.2. Which type of firewall policy calls for a firewall to deny all traffic by default? (Points : 5) Permissive policy Perimeter policy Restrictive policy Demilitarized policy Question 3.3.What is a program that appears to do something useful but is actually malware? (Points : 5) Virus Logic bomb Trojan Back door Question 4.4.In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated? (Points : 5) Basic Challenge/response Biometrics Signature Question 5.5.Which type of attack works by an attacker operating between two computers in a network and impersonating one computer...
Buy now to view the complete solution
Other Similar Questions
User Profile
maste...

Saint com545 final exam

Question Question 1. Question : Which type of endpoint communication is not susceptible to malware (virus) infection? E-mail SMS message instant message/chat Internet browsing Pots Received: 1 of 1 Comments: Question 2. Quest...
User Profile
maste...

Saint COm530 quiz 3 module 8 (100% Answer)

Question Question 1.1.What should a company consider installing on the network perimeter to prevent direct connections between the internal network and the Internet to help protect its data warehouses and employee privacy? (P...
User Profile
maste...

Saint Com510 Midterm Exam 2017 (Perfect Answer)

Question Question 1 (5 points) The macro virus infects the key operating system files located in a computer’s start up sector. Question 1 options: True False Save Question 2 (5 points) Which function of InfoSec Management e...
User Profile
maste...

Saint Com203 Quiz 2 Latest 2016

Question Question 1. Question: In the computer industry, which term refers to the physical size and dimensions of a component? Bus Speed Clock Speed Form Factor Service Life Storage Capacity Question 2. Question : A processor...
User Profile
maste...

Saint COM530 module 2 quiz

Question 1.1. An activist can best be described as which of the following? (Points : 5) An unskilled programmer that spreads malicious scripts Consider themselves seekers of knowledge Use DoS attacks on websites with which th...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35