IT Security Protocol Packets Quiz

9 Questions | Total Attempts: 246

SettingsSettingsSettings
IT SecurITy Protocol Packets Quiz - Quiz

FINAL HELP FOR IT SECURITY ENJOY GUYS


Questions and Answers
  • 1. 
    Which of the following iptables rules would generate a destination unreachable error?
    • A. 

      Iptables –A FORWARD –s 0/0 –d 0/0 –j ACCEPT

    • B. 

      Iptables –A FORWARD –s 0/0 –d 0/0 –j DROP

    • C. 

      Iptables –P FORWARD DROP

    • D. 

      Iptables –A FORWARD –s 0/0 –d 0/0 –j REJECT

    • E. 

      None of the above

  • 2. 
    Standards for protocols and associated information are first published in?
    • A. 

      InternNIC newsletters

    • B. 

      ARPA

    • C. 

      RFCs

    • D. 

      IANA

    • E. 

      RDPs

  • 3. 
    The ICMP protocol is specifically designed to:
    • A. 

      Check & report on network error conditions

    • B. 

      Generate networking stats

    • C. 

      Control traffic flow across networks

    • D. 

      Track end-to-end connectivity

    • E. 

      None of the above

  • 4. 
    Which of the following is an example of egress filtering?
    • A. 

      Having your gateway router block inbound traffic from "private IPs" (ex192.168.x.x)

    • B. 

      Only allowing traffic to leave you network with a source IP in your company's IP range

    • C. 

      Installing a spam filter on your mail server

    • D. 

      Only allowing traffic into your network with a source IP not in your company's IP range

    • E. 

      Having the firewall ensure that traffic from public IP’s can’t get into your network

  • 5. 
    Of all the vulnerabilities listed below, which is considered the hardest to harden against?
    • A. 

      Low physical security

    • B. 

      Active services

    • C. 

      Open ports

    • D. 

      The human element

    • E. 

      Bad passwords

  • 6. 
    In security environments, Authorization means
    • A. 

      Confirming your identity with an element unique to the person

    • B. 

      Supplying your identity

    • C. 

      Using your identity to assign access rights

    • D. 

      Tracking what users are doing while accessing the systems

    • E. 

      None of the above

  • 7. 
    It is possible to capture packets from the network that are not destined for your machine.
    • A. 

      False

    • B. 

      True

  • 8. 
    A friend lends you the latest INXS music CD he just purchased. You take it home and make a copy. Have you broken any laws?
    • A. 

      Yes

    • B. 

      No

  • 9. 
    During a packet capture, you notice a couple of TCP packets with the “F” flag and some “A” flags. What is likely going on?
    • A. 

      A TCP/IP session setup process

    • B. 

      An ICMP Request / Reply process

    • C. 

      An ARP process

    • D. 

      A UDP-based FTP session

    • E. 

      A TCP/IP session shutdown process

Back to Top Back to top