Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
IS 182 Exam 1
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (30)
When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?
In an authorization file on the host where the SSH server is.
The combination of a public key and a private key are known by what term below?
key pair
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
VPN gateway
How often should administrators and network users be required to change their password?
60 days
The SSH service listens on what TCP port?
22
Which of the following is NOT an encryption algorithm used by SSH?
SHA-2
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
SSTP
A SecurID key chain fob from RSA security generates a password that changes how often?
every 60 seconds
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
FCS
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?
virtual wire mode
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?
metasploit
At what layer of the OSI model do firewalls operate?
Network
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?
reverse proxy
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
man-in-the-middle attack
In ACL statements, the any keyword is equivalent to using which wildcard mask?
255.255.255.255
What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?
polymorphism
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
Honeynet
What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?
smurf attack
Which software below serves as the firewall for Linux systems?
iptables
Packets that are smaller than a medium's minimum packet size are known by what term below?
runts
When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones?
user agent client
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
expedited forwarding
What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?
MPLS
Which of the following is not a requirement in order to use a softphone?
A wireless carrier to handle the voice path.
What percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018?
79%
In a VoIP call, what method of transmission is used between two IP phones?
unicast
A highly available server is available what percentage of the time?
99.99%
In H.323, which protocol below handles call or videoconference signaling?
H.225
What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?
PCI DSS
Sets with similar terms
Network + Chapter 7,8,9
90 terms
Network+ 7th edition Ch. 7&8
30 terms
Comp 3 exam
85 terms
Chapter 7
30 terms
Other sets by this creator
212 WA6
10 terms
Ch.8 - 211
71 terms
Ch.7 - 211
20 terms
212 WA5
10 terms