Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Saint COM530 module 2 quiz
Question 1.1. An activist can best be described as which of the following? (Points : 5)
An unskilled programmer that spreads malicious scripts
Consider themselves seekers of knowledge
Use DoS attacks on websites with which they disagree
Deface websites by leaving messages for their friends to read
Question 2.2. Which type of firewall policy calls for a firewall to deny all traffic by default? (Points : 5)
Permissive policy
Perimeter policy
Restrictive policy
Demilitarized policy
Question 3.3.What is a program that appears to do something useful but is actually malware? (Points : 5)
Virus
Logic bomb
Trojan
Back door
Question 4.4.In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated? (Points : 5)
Basic
Challenge/response
Biometrics
Signature
Question 5.5.Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications? (Points : 5)
Malicious port scanning
Man-in-the-middle
Denial of service
Remote procedure call
Question 6.6.How large is the IPv6 address space? (Points : 5)
32 bits
128 bits
64 bits
168 bits
Question 7.7.Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped? (Points : 5)
TTL
Fragment Offset
ECN
Options
Question 8.8.Which protocol is responsible for automatic assignment of IP addresses? (Points : 5)
DNS
DHCP
FTP
SNMP
Question 9.9.Which of the following is not an advantage of IPv6 versus IPv4? (Points : 5)
Larger address space
Built-in security
Supports static configuration
NAT is unnecessary
Question 10.10.Which of the following is a valid IPv6 address? (Points : 5)
5BA4:2391:0:0:4C3E
1080::8:800:200C:417A
24::5B1A::346C
5510:ABCD::34:1::2
Question 11.11.Which TCP flag can be the default response to a probe on a closed port? (Points : 5)
RST
URG
PSH
SYN
Question 12.12.Which of the following is the description of a land attack? (Points : 5)
The local host source address occurs in the packet.
Source and destination IP address/port are the same.
An illegal TCP flag is found in the segment header.
The attacker uses an undefined protocol number.
Question 13.13.What is the typical packet sequence for closing a TCP session? (Points : 5)
FIN, FIN ACK, RST
FIN, ACK, FIN ACK, ACK
FIN ACK, FIN, ACK, RST
FIN, FIN ACK
Question 14.14.Which of the following is an element of the TCP header that can indicate that a connection has been established? (Points : 5)
Flags
Stream index
SEQ/ACK analysis
Sequence number
Question 15.15.Of what category of attack is a DoS attack an example? (Points : 5)
Bad header information
Single-packet attack
Multiple-packet attack
Suspicious data payload
Question 16.16.What uses mathematical calculations to compare routes based on some measurement of distance? (Points : 5)
Route summarization
Link-state routing protocols
Routing metrics
Distance-vector routing protocols
Question 17.17.Which protocol that runs on Cisco routers shares information between Cisco devices? (Points : 5)
CDP
TCP
bootp
SSH
Question 18.18.Which of the following is true about ACLs on Cisco routers? (Points : 5)
There is an implicit deny any statement at the end of the ACL.
There is an explicit permit any statement at the beginning of the ACL.
ACLs are processed in reverse order so place high priority statements last.
ACLs bound to an interface apply to inbound and outbound traffic by default.
Question 19.19.Which of the following types of traffic does NOT travel through routers? (Points : 5)
DNS zone transfers
ARP requests
SNMP status information
Network route information
Question 20.20.Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router? (Points : 5)
Console
AUX
Enable
TTY
- @
- 177 orders completed
- ANSWER
-
Tutor has posted answer for $12.00. See answer's preview
******** 11 ** ******** can **** be ********* ** ***** ** *** ********** ******* * ***
**
********* programmer **** ******* ********* ******** Consider
themselves
******* of ********** *** ***
*******
on ******** **** ***** **** ********* ****** websites **
leaving ******** *** their ******* ** ***** Question 22 *****
****
of ******** policy ***** for a ******** to **** *** traffic ** ******** ******* * 5) ********** policy Perimeter *******
Restrictive
******* Demilitarized
policy
******** ******
**
a program
**** appears
**
do something useful but is actually malware? ******* * *** ****** ***** ***** Trojan Back door Question ****
*****
****
**
************** ****
the
**************
******
******** a
******
code and **** it ** *** user *** wants ** ** ************** ******* * *** ****** Challenge/response *********** ********** Question ******* type ** ****** works ** ** ********
*********
*******
two
*********
**
*
network
and
*************
*** ******** ** intercept *************** ******* * *** Malicious **** scanning ****************** ****** of ******** ****** ********* ***** ******** ***** ***** ** *** **** ******* ******
*******
* *** **
*****
***
*****
64 ***** 168
*****
Question 77Which *****
**
the ** ****** is ** ***** value that ********** *** maximum
******
** ****
the
****** ***
******
** ***
*******
before **
is
******** ******* * *** **** ******** Offset ECN ******** Question ******* ******** ** *********** *** automatic ********** of IP ********** ******* * *** **** ***** **** ***** ******** 99Which ** *** *********
**
not
**
********* **
****
versus
*****
(Points
:
*** ****** ******* ****** Built-in ********* ******** ****** ************** NAT ** ************ ******** *********
**
***
*********
**
*
*****
****
********
*******
* 5) ******************* ********************** *************** 5510:ABCD::34:1::2 Question ********* *** **** *** ** the default ******** **
a
probe ** a
closed
port? (Points
:
5) **** ****
****
**** ******** *********
of
*** ********* ** the description ** a land ******* ******* * *** ***
*****
****
******
address
******
in
***
*******
******
and destination ** ************ *** *** ***** An ******* *** flag ** ***** ** *** ******* ******* *** attacker
****
**
undefined
********
number
********
********
**
***
typical packet sequence *** ******* * *** ******** ******* * *** FIN *** ACK RST
***
*** *** *** **** *** ACK FIN *** ****
FIN
*** ACK ******** ********* ** the following **
**
******* ** *** *** ****** that *** ******** **** *
**********
*** **** ************ ******* * 5) Flags
******
****** ******* analysis ******** ******* ******** ****** what ******** of ****** is * *** ******
**
******** ******* * ***
***
****** information ************* ******* ***************
attack
Suspicious **** ******** ******** ********
uses
************ ************ **
*******
****** ***** on **** *********** of ********* ******* * *** ***** summarization Link-state ******* ********** Routing ******** *************** ******* protocols ******** ********* ******** ****
****
**
*****
******* ******
***********
******* *****
devices?
******* :
***
**** **** ****** **** ******** 1818Which ** *** ********* is true ***** ACLs ** *****
routers?
(Points * ***
*****
** **
********
deny ***
statement
at *** end
**
the **** ***** ** an explicit permit any statement at *** beginning of *** **** **** are
processed
** *******
*****
so ***** ****
********
********** last
****
***** ** an
*********
***** ** ******* *** outbound traffic ** ******** ******** ********* of *** ********* ***** of traffic
does
***
travel
through
********
*******
*
***
***
zone ********** *** ********* **** ****** information Network route ************ ******** ********* ** *** following
*****
of ********* prevents a **** **** ********* privileged **** mode ** * *****
router?
******* * 5) ******** **** ******* ***