Computer Networks Exam Review - 504 Verified Questions

Page 1


Computer Networks

Exam Review

Course Introduction

Computer Networks explores the fundamental principles, technologies, and architectures that enable the exchange of data and resources across interconnected computer systems. The course covers key topics such as network models, protocols, transmission media, data link and network layers, routing algorithms, flow and congestion control, wireless and wired networks, and network security. Through lectures and hands-on projects, students gain a thorough understanding of how the Internet and other networks operate, as well as practical skills in network design, implementation, and troubleshooting.

Recommended Textbook

CWSP Guide to Wireless Security 1st Edition by Mark Ciampa

Available Study Resources on Quizplus

12 Chapters

504 Verified Questions

504 Flashcards

Source URL: https://quizplus.com/study-set/1118

Page 2

Chapter 1: Foundations of Wireless Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21967

Sample Questions

Q1) Briefly explain how wireless technology increases network reliability.

Answer: One of the main sources of wired network problems is network cable failure. Moisture from a leak during a thunderstorm or a coffee spill can erode metallic conductors. A user who shifts the computer on his or her desk may break one or more of the wires in a patch cable. A cable splice that is done incorrectly can cause problems that result in intermittent errors that are very difficult to identify. Using wireless LAN technology eliminates these types of cable failures and increases the overall reliability of the network.

Q2) Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____.

A) mobility

B) network reliability

C) installation costs

D) security

Answer: D

Q3) The term ____________________ is frequently used to describe the tasks of guarding information that is in a digital format.

Answer: information security

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Wireless LAN Vulnerabilities

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21968

Sample Questions

Q1) To encrypt packets WEP can use only a 64-bit or ____-bit number.

A) 72

B) 90

C) 110

D) 128

Answer: D

Q2) Changing the original text to a secret message using cryptography is known as ____.

A) ciphertext

B) decryption

C) encryption

D) plaintext

Answer: C

Q3) The SSID can be easily discovered even when it is not contained in beacon frames.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Passive Wireless Discovery

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21969

Sample Questions

Q1) Promiscuous mode will not work on a WLAN.

A)True

B)False

Answer: True

Q2) Many of the functions of a PDA are now incorporated into cellular telephones sometimes called ____.

A) smartphones

B) handheld PCs

C) tablet computers

D) slate computers

Answer: A

Q3) At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.

A) phishing

B) beaconing

C) pharming

D) mapping

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Active Wireless Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21970

Sample Questions

Q1) What are some of the symptoms that indicate a virus has infected a computer?

Q2) A ____ program creates fake packets and flood the wireless network.

A) MAC

B) packet sniffer

C) packet generator

D) CSMA/CA

Q3) Briefly describe how to perform a wired network DoS attack.

Q4) Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.

A) Physical

B) MAC

C) Network

D) Application

Q5) Authentication can be performed based on what you have, what you know, or what you are.

A)True

B)False

Q6) What are the problems of using community strings in SNMP?

Q7) What are the problems with using default passwords?

Q8) What are some of the characteristics of weak passwords?

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Wireless Security Models

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21971

Sample Questions

Q1) How do TKIP and MIC perform encryption in the WPA personal security model?

Q2) When should you use the transitional security model?

Q3) AES performs three steps on every block (128 bits) of cleartext. Within the second step, multiple iterations (called ____________________) are performed depending on the key size.

Q4) What are some of the reasons why turning off SSID beaconing provides a limited degree of security?

Q5) The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.

A) supplicant

B) authenticator

C) authentication server

D) RADIUS

Q6) WPA replaces the Cyclic Redundancy Check (CRC) function in WEP with the ____.

A) per-packet keys

B) Message Integrity Check (MIC)

C) TKIP check

D) TKIP keys

Q7) WPA replaces WEP with an encryption technology called

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Enterprise Wireless Hardware Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21972

Sample Questions

Q1) In the ____ access control, the user is not allowed to give access to another user to use or access anything on the network.

A) mandatory

B) role based

C) discretionary

D) temporal

Q2) The IEEE ____ protocol allows a wireless client to determine the QoS (and security) being used at a different AP before making the transition.

A) 802.11e

B) 802.11F

C) 802.11q

D) 802.11r

Q3) Like hubs, network switches are capable of inspecting data packets as they are received.

A)True

B)False

Q4) Describe the main characteristics of transmit power control (TPC).

Q5) What are the three basic types of filtering?

Q6) What are the four operational mode supported by remote wireless bridges?

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Designing a Secure Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21973

Sample Questions

Q1) What are some of the features and tools provided by antispyware products?

Q2) ____ is used to create smaller segments for security purposes.

A) CSMA/CA

B) CSMA/CD

C) Ethernet

D) Segmentation

Q3) The foundation of a firewall is a(n) ____________________.

Q4) A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.

Q5) ____________________ are the air-handling spaces above drop ceilings used to circulate and otherwise handle air in a building.

Q6) What are some of the advantages of using NAT?

Q7) A firewall is sometimes called a ____.

A) bridge

B) hub

C) packet filter

D) repeater

Q8) How does Microsoft classify patches?

Q9) Briefly describe how to create wireless VLANs using switches.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Secure Wireless Authentication

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21974

Sample Questions

Q1) The International Organization for Standardization (ISO) created a standard for directory services known as ____.

A) ISO.500

B) LDAP-1000

C) X.500

D) Z.101

Q2) Entries in the DIB are arranged in a tree structure called the ____________________.

Q3) Identify the types of information typically included in a digital certificate.

Q4) A ____ deployment uses local authentication with one or more RADIUS servers at each site. However, the authentication database is replicated from one central site to each local site.

A) distributed autonomous site

B) distributed sites with centralized authentication and security

C) single site deployment

D) distributed sites and security with centralized authentication

Q5) How does Kerberos work?

Q6) The ____________________ is used by the EAP key exchanges to provide data origin authenticity.

Q7) What are the primary differences between LDAP and DAP?

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Secure Wireless Transmissions

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21975

Sample Questions

Q1) Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.

A)True

B)False

Q2) Briefly describe how SNMP works.

Q3) L2TP is only supported by Windows 2000 versions and higher.

A)True

B)False

Q4) In IPsec, key management is accomplished through a protocol known as ____.

A) Encapsulating Security Payload (ESP)

B) ISAKMP/Oakley

C) Authentication Header (AH)

D) L2TP

Q5) How does SCP work?

Q6) Why is IPsec considered a transparent protocol?

Q7) The most widely used public cryptography system for encrypting e-mail messages on Windows systems is a commercial product called ____________________.

Q8) An enhanced feature of SSH is known as port forwarding, also called

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Managing the Wireless Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21976

Sample Questions

Q1) A ____ constantly monitors the radio frequency (using wireless probes) for attacks.

A) wireless intrusion detection system (WIDS)

B) wireless AP detection system (WADS)

C) rogue AP prevention system (RAPS)

D) rogue AP detection system (RADS)

Q2) A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.

A) signature detection

B) anomaly detection

C) known attacks detection

D) pattern detection

Q3) A more proactive approach than intrusion detection is a(n) ____.

A) RF fingerprinting

B) trilateration system

C) RSSI system

D) intrusion prevention system (IPS)

Q4) Global positioning systems (GPS) are widely used in 802.11 WLANs.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Wireless Security Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21977

Sample Questions

Q1) A(n) ____ provides a visual image of the attacks that may occur against an asset.

A) asset tree

B) attack tree

C) asset modeling

D) asset identification

Q2) The ____ is the expected monetary loss that can be expected for an asset because of a risk over a one-year period.

A) Exposure Factor (EF)

B) Annualized Rate of Occurrence (ARO)

C) Annualized Loss Expectancy (ALE)

D) Single Loss Expectancy (SLE)

Q3) What are the characteristics of a policy?

Q4) A(n) ____ policy should clearly address how passwords are managed.

A) password management

B) VPN

C) acceptable use

D) WLAN use

Q5) What are the types of assets available at any organization?

Q6) What are the options faced by an organization when confronted with a risk?

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Operational Support and Wireless Convergence

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21978

Sample Questions

Q1) ____, or controlling changes made to the WLAN after installation, is another key element of operational support.

A) Controlling and Evaluation

B) Configuration management

C) Monitoring

D) Education

Q2) Why is it important to train and educate all network users?

Q3) Briefly describe traffic filtering.

Q4) IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.

A) 802.11a

B) 802.11g

C) 802.11i

D) 802.11r

Q5) All computer users share responsibility for protecting the assets of an organization. A)True

B)False

Q6) What elements can be identified using WLAN monitoring tools?

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Computer Networks Exam Review - 504 Verified Questions by Quizplus - Issuu