Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask English Expert

Question 1.1. An activist can best be described as which of the following?

An unskilled programmer that spreads malicious scripts

Consider themselves seekers of knowledge

Use DoS attacks on websites with which they disagree

Deface websites by leaving messages for their friends to read

Question 2.2. Which type of firewall policy calls for a firewall to deny all traffic by default?

Permissive policy

Perimeter policy

Restrictive policy

Demilitarized policy

Question 3.3.What is a program that appears to do something useful but is actually malware?

Virus

Logic bomb

Trojan

Back door

Question 4.4.In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

Basic

Challenge/response

Biometrics

Signature

Question 5.5.Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

Malicious port scanning

Man-in-the-middle

Denial of service

Remote procedure call

Question 6.6.How large is the IPv6 address space?

32 bits

128 bits

64 bits

168 bits

Question 7.7.Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?

TTL

Fragment Offset

ECN

Options

Question 8.8.Which protocol is responsible for automatic assignment of IP addresses?

DNS

DHCP

FTP

SNMP

Question 9.9.Which of the following is not an advantage of IPv6 versus IPv4?

Larger address space

Built-in security

Supports static configuration

NAT is unnecessary

Question 10.10.Which of the following is a valid IPv6 address?

5BA4:2391:0:0:4C3E

1080::8:800:200C:417A

24::5B1A::346C

5510:ABCD::34:1::2

Question 11.11.Which TCP flag can be the default response to a probe on a closed port?

RST

URG

PSH

SYN

Question 12.12.Which of the following is the description of a land attack?

The local host source address occurs in the packet.

Source and destination IP address/port are the same.

An illegal TCP flag is found in the segment header.

The attacker uses an undefined protocol number.

Question 13.13.What is the typical packet sequence for closing a TCP session?

FIN, FIN ACK, RST

FIN, ACK, FIN ACK, ACK

FIN ACK, FIN, ACK, RST

FIN, FIN ACK

Question 14.14.Which of the following is an element of the TCP header that can indicate that a connection has been established?

Flags

Stream index

SEQ/ACK analysis

Sequence number

Question 15.15.Of what category of attack is a DoS attack an example?

Bad header information

Single-packet attack

Multiple-packet attack

Suspicious data payload

Question 16.16.What uses mathematical calculations to compare routes based on some measurement of distance?

Route summarization

Link-state routing protocols

Routing metrics

Distance-vector routing protocols

Question 17.17.Which protocol that runs on Cisco routers shares information between Cisco devices?

CDP

TCP

bootp

SSH

Question 18.18.Which of the following is true about ACLs on Cisco routers?

There is an implicit deny any statement at the end of the ACL.

There is an explicit permit any statement at the beginning of the ACL.

ACLs are processed in reverse order so place high priority statements last.

ACLs bound to an interface apply to inbound and outbound traffic by default.

Question 19.19.Which of the following types of traffic does NOT travel through routers?

DNS zone transfers

ARP requests

SNMP status information

Network route information

Question 20.20.Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router?

Console

AUX

Enable

TTY

English, Academics

  • Category:- English
  • Reference No.:- M92286762
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in English

Create a 300 word answer include a short quote from the

Create a 300 word answer. Include a short quote from the text to back up your ideas. Cite your quote at the end of your entry MLA style. TOPIC: Spanish literature also created a classic world novel. This is Don Quixote b ...

Case study scenario you have been hired by xyz university

Case Study Scenario: You have been hired by XYZ University as a consultant. They want you to evaluate an organization to see if a service learning opportunity would benefit future students and the community. WEEK 2 ASSIG ...

Overview the research paper is to be approximately four

Overview: The research paper is to be approximately four pages long each (double spaced) not including the citations. For information on how to prepare the citations. Your research paper should include specific examples ...

Reading practices are an intellectual endeavor this is not

Reading practices are an intellectual endeavor, this is not about reading in order to absorb information but rather, reading in order to analyze arguments, broaden our engagements with ideas, and generate a sense of ours ...

This is going to be a post on a blog for my class please be

This is going to be a post on a Blog for my class. Please be creative. Pictures and are okay to use. Not too short but not too long so it's not too boring to read. Fight for Freedom. Consider Douglass's speech "What to t ...

Question the following task is designed to expand your

Question: The following task is designed to expand your familiarity with UMUC's Information and Library Service's OneSearch function. As with the previous two library tasks, completing this exercise will help inform your ...

An octoroon - the art of dramatic composition a

An Octoroon - The Art Of Dramatic Composition: A Prologue Script Analysis: 1000 Words Use two other resources: Background information: May include: What is the play, who wrote it, when is it from, what style is it writte ...

Question imagine a product that might solve a common

Question : Imagine a product that might solve a common problem in your industry of interest. Write a sales letter using Monroe's Motivates Sequence, targeting a potential buyer of the product. The letter should be writte ...

Question 1 what is the full name of the theory that you are

Question: 1. What is the full name of the theory that you are investigating for your final paper, and what is its goal (to predict, explain, change or understand)? 2. To which of the seven communication traditions does t ...

Question for this essay you will1watch the disney film

Question: For this essay you will: 1. Watch the Disney film "Hercules". Netflix and Amazon are just a few of the possibilities for finding and watching the film. 2. Then you will read the novel, screenplay or stage play ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As