Wk 1 Study Flash

 

48 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
______ monitor internet traffic and block access to preselected websites and files. Proxy servers / Protocol analyzers
/ intenet content filters / NIDS
Internet content filters
A software based ________ attempts to monitor and possibly prevent attempts to attack a local system. SIDS / PIDS
/ NIDS / HIDS
HIDS
The goal of _______ is to prevent computers with sub-optimal security from potentially infecting other computers through the network. PAT / NAT
/ subnetting / NAC
NAC
_____ examines the current state of a system or network device before it is allowed to connect to the network. NAC / NAT
/ VAC / PAT
NAC
A variation of NAT is _______. Instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different TCP port number. DAT / CAT
/ TAT / PAT
PAT
Using ________, networks can essentially be divided into three parts: network, subnet, and host. stateful addressing / stateless addressing
/ subnetting / classful addressing
SUBNETTING
At regular intervals a wireless AP sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ______. caching / mapping
/ scanning / beaconing
BEACONING
In order for a host using TCP/IP on an Ethernet network to find the MAC address of another device. it uses ______. MAC-DNS / ARP
/ DNS / BIND
ARP
DNS poisoning can be prevented by using the latest editions of the DNS software, _____. DNSS BINDSEC
/ BIND IPsec
BIND
A(n) _____ attack makes a copy of the transmission before sending it to the recipient at a later time. man-in-the-middle / replay
/ ARP poisoning / DNS spoofing
REPLAY
With wireless CSMA/CA, the amout of time that a device must wait after the medium is clear is called the ______ time. collision / slot
/ tx / clear
SLOT
_______ allows the administrator to configure a switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch. Port Mirroring / Sniffing
/ Protocol Analyzer / NIC mirroring
PORT MIRRORING
The _____ record is an entry in the Domain Name System (DNS) that identifies the mail server responsible for handling that domain name. IM / AX
/ DEP / MX
MX
In a P2P network, a ______ is a server program operated by the person or organization that wants to share the file. torrent / seed
/ tracker / leecher
TRACKER
Regarding email, _____ is responsible for incoming mail.
IMAP4 / SNMP
/ POP3 / SMTP
POP3