Preview

SEC 435 Wk 11 Final Exam

Satisfactory Essays
Open Document
Open Document
513 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SEC 435 Wk 11 Final Exam
SEC 435 Wk 11 Final Exam https://hwguiders.com/downloads/sec-435-wk-11-final-exam SEC 435 Wk 11 Final Exam

• Question 1 ____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet. • Question 2 ____ is a wireless hacking tool for auditing wireless networks. • Question 3 ____ is a free stumbler application for Mac OS X that puts the computer’s wireless card into monitor mode. • Question 4 A(n) ____ is a piece of wireless communication hardware that creates a central point of wireless connectivity. • Question 5 ____ allows for the interconnecting of any type of fixed network technology and provides separate Quality of Service (QoS) for separate connections. • Question 6 In ____, an attacker sends a message that looks genuine, but in reality, the message is broken or fuzzed. • Question 7 TFTP servers usually use UDP port ____. • Question 8 A TCP ____ scan involves sending a TCP SYN-flagged or ACK-flagged packet to a commonly used TCP port on the target host. • Question 9 ____ allows secure connections to any other PGPnet/IPSec host on the Internet regardless of whether the user has communicated with that host previously, without preconfiguration of that host. • Question 10 ____ is the process of unlocking the iPhone or iPod touch in order to install unlicensed applications, add new ringtones, or change the device’s wallpaper. • Question 11 ____ involves sending messages to devices over Bluetooth. • Question 12 The ____ tool can be used to identify RFID tags. • Question 13 The ____ is the most important part of any network, so usually it is given a higher level of security. • Question 14 The ____ tool simulates the real-time scenario in which a large number of users make requests to a Web application. • Question 15 ____ is performed by putting an artificial load on a

You May Also Find These Documents Helpful

  • Good Essays

    Sc121 Final Exam

    • 394 Words
    • 2 Pages

    Glucagon causes the liver to convert stored glycogen into glucose, which is released into the bloodstream. High blood glucose levels stimulate the release of insulin.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Agec 424 Final Exam

    • 2763 Words
    • 12 Pages

    You must show logically correct work, including calculator inputs and outputs for all problems to receive credit. Show signs on calculator inputs. Differentiate calculator outputs from inputs.…

    • 2763 Words
    • 12 Pages
    Satisfactory Essays
  • Powerful Essays

    Ait235 Quizes

    • 5726 Words
    • 23 Pages

    A _________ area network usually has an extremely limited distance of a few feet or meters.…

    • 5726 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 3 Ntc 362

    • 664 Words
    • 3 Pages

    In telecommunication, the specification of network architecture may also include a detailed description of products and services delivered via a communications network, as well as detailed rate and billing structures under which services are…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Spoofing Facts

    • 433 Words
    • 2 Pages

    Spoofing is used to hide the true source of packets or redirect traffic to another location. Spoofing attacks:…

    • 433 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In the event that a packet becomes lost due to network congestion, traffic load balancing, or other unpredictable network behavior, TCP detects these problems, requests retransmission of lost data, rearranges out-of-order data, and even helps minimize network congestion to reduce the occurrence of the other problems. Once the TCP receiver has reassembled the sequence of octets originally transmitted, it passes them to the application program.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Wireless Intrusion Prevention Systems (WIPS): monitors a wireless network for suspicious traffic by analyzing wireless networking protocols.…

    • 467 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    service disruptions, often for extended periods of time. The relative ease and low costs of launching such…

    • 9594 Words
    • 39 Pages
    Powerful Essays
  • Good Essays

    sdffg

    • 6640 Words
    • 27 Pages

    properly configured piece of the network. Due to this, the 'information' needed by the 'other side'…

    • 6640 Words
    • 27 Pages
    Good Essays
  • Good Essays

    Note : This paper contains fifty (50) objective type questions, each question carrying two (2) marks.…

    • 1496 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Computer Networking is a subject rich with specialized terminology and technology. Computer networks have spawned a language of their own, and half the challenge of becoming network literate lies in mastering this terminology. You must learn some new vocabulary. You are required to use various resources to determine the meaning and/or definitions for the following computer networking terms. You may consult textbooks, class notes, additional slides on isNotes (ICN210 folder), the internet, etc. As much as possible, attempt to explain the meaning of the terms in your own words. Simply cutting and pasting text from internet sources is not allowed. Restrict the explanations or definitions to a few sentences only. Provide diagrams and examples wherever applicable. Do not simply copy the work of another student. This defeats the whole purpose of the learning exercise. The completed list of definitions/explanations should be submitted via email to icn.changula@gmail.com before Friday 02/03/2012…

    • 325 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    4. Networks would be inoperable without protocols. Explain their importance and what functions they perform.…

    • 4051 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Mccabe3E Solutions Manual

    • 16977 Words
    • 68 Pages

    Chapter 1 Exercises: 1. In example 1.1, an analogy was drawn between a network’s architecture and design and a home’s architecture and design. Provide a similar analogy, using a computer’s architecture and design. A. While the network\home can be thought of as an overall entity that is comprised of discrete elements that function as a whole, an analogy using the architecture of a computer is also appropriate. The frame of the house and the various mechanical components can be viewed as the overall computer “system” (disks, memory, power, display). The computer is comprised of an overall system architecture based on the designers’ needs and design constraints – much like the network. Specific comparisons are that the signal and data busses comprise the physical network with the Operating System analogous to the router and route-policy systems in the network. As the network is equipped with ports in locations necessary for user and device access, the computer is equipped with interfaces and interface devices that enhance the ability of users to interact with the computer – mouse, keyboard, monitor, etc. 2. Given the existing configuration a total link-weight of 22 between Network A (Joe) and Network B (Sandy) is currently in place. Given the option of adding an additional link with a weighting of 15 to the architecture – the link could be added between Network C and Network B to arrive at a total link weighting of 20, or the link could be directly implemented between Networks A and B. The exact location for improving the interconnectedness between the networks should be determined by studying the communication flow between Networks A and B as well as Network C and B. 3. A CDN is a WAN service that is specifically optimized for the distribution of either static or streaming content to Internet users. There are two functions that differentiate a CDN from most traditional public IP-based networks – namely the function to look at the source of a connection request and…

    • 16977 Words
    • 68 Pages
    Powerful Essays