DOC PREVIEW
DMC ITSY 2430 - Chapter Quiz 1

This preview shows page 1 out of 4 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1. What advantages does IPv6 have over IPv4? (Choose all that apply.)2. Which of the following is a method of hiding internal host IP addresses? (Choose all that apply.)3. A Class C address has a first octet decimal range of ___________ to ___________.4. Class D addresses are reserved for experimentation. True or False?5. The reserved Class A address 127.0.0.1 is used for which of the following?6. What are the primary subdivisions of an IP datagram? (Choose all that apply.)7. Fragmentation of IP packets causes several security problems. How should you configure the firewall or packet filter to prevent harm from fragmented packets? (Choose all that apply.)8. Most network intrusions originate from what location?9. Why is UDP considered unreliable?10. A DNS server translates _____________ to ______________________.11. How can DNS help network administrators?12. DNS is vulnerable to what types of attacks? (Choose all that apply)13. What kind of network communication requires a third-party program rather than a firewall or an IDS to scan for viruses or harmful executables?14. What are some of the reasons for network attacks? (Choose all that apply.)15. A port number combined with a computer’s IP address constitutes a network connection called a(n) _________________.16. Why is fragmentation considered a security risk?17. The ability to prevent one participant in an electronic transaction from denying that it performed an action is called _____________.18. Firewall enforcement of policies is handled primarily through setting up packet-filtering rules, a set of which is contained in the ______________________.19. Servers with outside access to the public should never be located where?20. The signs of possible attacks detected by an IDS are commonly called signatures. What information do signatures contain? (Choose all that apply.)Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796Chapter 1, Page 40 Prof. Michael P. HarrisITSY 2430 Intrusion Detection Chapter Quiz 01Name: __________________ Date: ________ Chapter Review Questions, Network Defense Fundamentals1. What advantages does IPv6 have over IPv4? (Choose all thatapply.) 2. Which of the following is a method of hiding internal host IP addresses? (Choose all that apply.)3. A Class C address has a first octet decimal range of ___________ to ___________. 4. Class D addresses are reserved for experimentation. True orFalse? 5. The reserved Class A address 127.0.0.1 is used for which ofthe following?6. What are the primary subdivisions of an IP datagram? (Choose all that apply.) Page 1 of 4Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796Chapter 1, Page 40 Prof. Michael P. Harris7. Fragmentation of IP packets causes several security problems. How should you configure the firewall or packet filter to prevent harm from fragmented packets? (Choose all that apply.)8. Most network intrusions originate from what location? 9. Why is UDP considered unreliable? 10. A DNS server translates _____________ to ______________________. 11. How can DNS help network administrators?12. DNS is vulnerable to what types of attacks? (Choose all that apply)13. What kind of network communication requires a third-party program rather than a firewall or an IDS to scan for viruses or harmful executables?Page 2 of 4Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796Chapter 1, Page 40 Prof. Michael P. Harris14. What are some of the reasons for network attacks? (Choose all that apply.)15. A port number combined with a computer’s IP address constitutes a network connection called a(n) _________________.16. Why is fragmentation considered a security risk? 17. The ability to prevent one participant in an electronic transaction from denying that it performed an action is called _____________. 18. Firewall enforcement of policies is handled primarily through setting up packet-filtering rules, a set of which is contained inthe ______________________. 19. Servers with outside access to the public should never be located where?20. The signs of possible attacks detected by an IDS are commonly called signatures. What information do signatures contain? (Choose all that apply.)Page 3 of 4Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796Chapter 1, Page 40 Prof. Michael P. Harris Page 4 of


View Full Document

DMC ITSY 2430 - Chapter Quiz 1

Documents in this Course
Load more
Download Chapter Quiz 1
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Chapter Quiz 1 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Chapter Quiz 1 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?