Security + Network Infrastructure

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Joelcg
J
Joelcg
Community Contributor
Quizzes Created: 5 | Total Attempts: 5,427
| Attempts: 585 | Questions: 41
Please wait...
Question 1 / 41
0 %
0/100
Score 0/100
1. Which of the following is a protocol/service used to transfer files from one host to another?

Explanation

File Transfer Protocol (FTP) is used to transfer files from one host to another. Internet Control Message Protocol (ICMP) is used verify that remote hosts are reachable. Telnet is a protocol/service that allows remote users to access a system using terminal emulation. Domain Name Service (DNS) is used to resolve host names to IP addresses.

Submit
Please wait...
About This Quiz
Security Plus Quizzes & Trivia

In this day and age, it’s important to know about the ins and outs of security and network infrastructure when it comes to computers, due to the dangers... see moreinvolved with using them. Do you know as much as you should? see less

2. Which of the following is a Class C private address?

Explanation

The Class C address range is from 192.168.0.0 to 192.168.255.255. The Class B private address range is from 172.16.0.0 to 172.31.255.255. The Class A private address range is from 10.0.0.0 to 10.255.255.25. The 127.0.86.1 address is incorrect because all addresses beginning with 127 are reserved for loopback purposes.

Submit
3. Which of the following is a private internal network implemented and maintained by an individual company or organization?

Explanation

An intranet is a private internal network implemented and maintained by an individual company or organization. An extranet is a private network that also includes outside partners. A demilitarized zone (DMZ) is an area where public server access is made available to people you might not trust. The Internet is the global network connecting computers and individual networks.

Submit
4. Which protocol is an anonymous version of FTP?

Explanation

Trivial File Transfer Protocol (TFTP) is an anonymous version of FTP. Simple Network Management Protocol (SNMP) is used to manage and monitor devices in a network. Internet Control Message Protocol (ICMP) is used to report errors and reply to requests from programs such as ping and traceroute. Internet Group Management Protocol (IGMP) is used to manage group or multicasting sessions.

Submit
5. Which of the following is a protocol/service used to resolve host names to IP addresses?

Explanation

Domain Name Service (DNS) is used to resolve host names to IP addresses. File Transfer Protocol (FTP) is used to transfer files from one host to another. Internet Control Message Protocol (ICMP) is used to verify that remote hosts are reachable. Telnet is a protocol/service that allows remote users to access a system using terminal emulation.

Submit
6. Which of the following is not a valid private address?

Explanation

The Class C address range is from 192.168.0.0 to 192.168.255.255. The Class B private address range is from 172.16.0.0 to 172.31.255.255. The Class A private address range is from 10.0.0.0 to 10.255.255.25. The address 127.0.86.1 is invalid because all addresses beginning with 127 are reserved for loopback purposes.

Submit
7. Which of the following is a private network that also includes outside partners?

Explanation

An extranet is a private network that also includes outside partners. An intranet is a private internal network implemented and maintained by an individual company or organization. A demilitarized zone (DMZ) is an area where public server access is made available to people you might not trust. The Internet is the global network connecting computers and individual networks.

Submit
8. In a three-way handshake, what is the second message sent?

Explanation

In a three-way handshake, the second message is SYN/ACK. The first message is SYN, and the third message is ACK. A message of RDRAM is not sent during any part of the process.

Submit
9. Which of the following is a protocol/service that allows remote users to access a system using terminal emulation?

Explanation

Telnet is a protocol/service that allows remote users to access a system using terminal emulation. FTP is used to transfer files from one host to another. Internet Control Message Protocol (ICMP) is used verify that remote hosts are reachable. Domain Name Service (DNS) is used to resolve host names to IP addresses.

Submit
10. Which of the following is a device that captures and displays network traffic?

Explanation

A sniffer is a device that captures and displays network traffic. A scanner is a device that looks for open ports. Neither a freezer nor a watchdog is a valid network device used for this purpose.

Submit
11. Which of the following is a Class B private address?

Explanation

The Class B private address range is from 172.16.0.0 to 172.31.255.255. The Class A private address range is from 10.0.0.0 to 10.255.255.25. The Class C address range is from 192.168.0.0 to 192.168.255.255. The address 127.0.86.1 is incorrect because any address beginning with 127 is reserved for loopback purposes.

Submit
12. Which of the following is a Class A private address?

Explanation

The Class A private address range is from 10.0.0.0 to 10.255.255.25. The Class B private address range is from 172.16.0.0 to 172.31.255.255. The Class C address range is from 192.168.0.0 to 192.168.255.255. The address 127.0.86.1 is incorrect because any address beginning with 127 is reserved for loopback.

Submit
13. Which of the following is the process of monitoring data that is transmitted across a network?

Explanation

Packet sniffing is the process of monitoring data that is transmitted across a network. Footprinting is the process of systematically identifying a network and its security posture. Scanning is the process that attackers use to gather information about how your network is configured. Signal analysis/intelligence involves methods used to gain information about your environment including footprinting and scanning.

Submit
14. In a three-way handshake, what is the first message sent?

Explanation

In a three-way handshake, the first message is SYN. The second message is SYN/ACK. The third message is ACK. A message of RDRAM is not sent during any part of the process.

Submit
15. Which well-known UDP port is used for standard SNMP traffic?

Explanation

Simple Network Management Protocol (SNMP) uses port 161. The NetBIOS name service uses port 137. The NetBIOS datagram service uses port 138. Traps use port 162.

Submit
16. Which of the following is an area where public server access is made available to people you might not trust?

Explanation

A demilitarized zone (DMZ) is an area where public server access is made available to people you might not trust. An intranet is a private internal network implemented and maintained by an individual company or organization. An extranet is a private network that also includes outside partners. The Internet is the global network connecting computers and individual networks.

Submit
17. Which protocol is a favorite for DoS attacks?

Explanation

Denial-of-service (DoS) attacks target Internet Control Message Protocol (ICMP). Simple Network Management Protocol (SNMP) is used to manage and monitor devices in a network. Internet Group Management Protocol (IGMP) is used manage group or multicasting sessions; although it could potentially be exploited by a DoS attack, it is not the best answer. Trivial File Transfer Protocol (TFTP) is an anonymous version of FTP.

Submit
18. What application interface does a Windows-based operating system use to communicate with TCP/IP?

Explanation

Windows-based operating systems use a Windows Socket (WinSock) to communicate with TCP/IP. The other options do not represent valid interfaces for this purpose.

Submit
19. Which protocol is used to report errors and reply to requests from programs such as ping and traceroute?

Explanation

Internet Control Message Protocol (ICMP) is used to report errors and reply to requests from programs such as ping and traceroute. Simple Network Management Protocol (SNMP) is used to manage and monitor devices in a network. Internet Group Management Protocol (IGMP) is used manage group or multicasting sessions. Trivial File Transfer Protocol (TFTP) is an anonymous version of FTP.

Submit
20. In a three-way handshake, what is the third message sent?

Explanation

In a three-way handshake, the third message is ACK. The first message is SYN, and the second message is SYN/ACK. A message of RDRAM is not sent during any part of the process.

Submit
21. Which of the following protocols does not operate at the application layer of the TCP/IP architecture?

Explanation

Address Resolution Protocol (ARP) operates at the Internet layer. All the other choices operate at the application layer.

Submit
22. Which well-known UDP port is used by the NetBIOS name service?

Explanation

Port 137 is used by the NetBIOS name service. Port 138 is used by the NetBIOS datagram service. Simple Network Management Protocol (SNMP) uses port 161, while traps use port 162.

Submit
23. Which of the following is the most recent version of SNMP?

Explanation

The most recent version of Simple Network Management Protocol (SNMP) is SNMPv3. This is a new standard, but most systems still use SNMPv2, which was an upgrade to SNMP. SNMPv4, or subsequent versions, is not out yet.

Submit
24. Which of the following standards provides wireless LAN bandwidth of 1Mbps or 2Mbps using the 2.4GHz spectrum?

Explanation

The 802.11 standard defines wireless LANs transmitting at 1Mbps or 2Mbps using the 2.4GHz spectrum. The 802.11a standard provides wireless bandwidth of up to 54Mbps in the 5GHz spectrum. The 802.11b standard provides for bandwidth up to 11Mbps in the 2.4GHz spectrum. The 802.11g standard provides for bandwidth up to 54Mbps in the 2.4GHz frequency spectrum.

Submit
25. Which of the following protocols operate at the TCP/IP application layer?

Explanation

SMTP operates at the application layer of the TCP/IP architecture. TCP operates at the host-to-host layer of the TCP/IP architecture. IP operates at the Internet layer of the TCP/IP architecture. UDP operates at the host-to-host layer of the TCP/IP architecture.

Submit
26. What type of broadcast is used in a smurf attack?

Explanation

A smurf attack, like many other UDP-based attacks, uses ICMP. The purpose is to overload the victim with ICMP responses and wreak havoc on the system. The other choices do not represent valid broadcasts/protocols used by smurf attacks.

Submit
27. To increase security on your server, you are replacing FTP with Secure FTP (SFTP). Which protocol is used to secure connections between the client and server?

Explanation

Secure FTP (SFTP) uses Secure Shell (SSH) as the protocol for securing connections between the client and the server. The other protocols listed do not provide this functionality with SFTP.

Submit
28. Which well-known UDP port is used by the NetBIOS datagram service?

Explanation

Port 138 is used by the NetBIOS datagram service. Port 137 is used by the NetBIOS name service. Simple Network Management Protocol (SNMP) uses port 161, while traps use port 162.

Submit
29. Which of the following protocols operate at the TCP/IP Internet layer?

Explanation

IP operates at the Internet layer of the TCP/IP architecture. TCP operates at the host-to-host layer of the TCP/IP architecture. SMTP operates at the application layer of the TCP/IP architecture. UDP operates at the host-to-host layer of the TCP/IP architecture.

Submit
30. Which of the following standards provides wireless LAN bandwidth of up to 11Mbps?

Explanation

While the 802.11 standard defines wireless LANs transmitting at 1Mbps or 2Mbps using the 2.4GHz spectrum, 802.11b provides for bandwidth up to 11Mbps. Both the 802.11a standard and 802.11g standard provide wireless bandwidth of up to 54Mbps, but in different spectrums.

Submit
31. Which of the following is the default file-sharing protocol for Unix-based systems?

Explanation

Network File System (NFS) is the default file-sharing protocol for Unix-based systems. Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a networking protocol proprietary to Novell that was used with NetWare 4.x and earlier versions. Network Basic Input Output System (NetBIOS) is the native networking protocol of Windows-based PCs. NetBIOS Extended User Interface (NetBEUI) is used to transport NetBIOS across the LAN.

Submit
32. Which port is used for the FTP control channel?

Explanation

The FTP control channel is port 21. The FTP data channel is port 20. Telnet uses port 23. Simple Mail Transfer Protocol (SMTP) uses port 25. For more information, see Chapter 3 in the Security+ Study Guide, 4th Edition from Sybex.

Submit
33. Which of the following is a protocol/service used to verify that remote hosts are reachable?

Explanation

Internet Control Message Protocol (ICMP) is used to verify that remote hosts are reachable. File Transfer Protocol (FTP) is used to transfer files from one host to another. Telnet is a protocol/service that allows remote users to access a system using terminal emulation. Domain Name Service (DNS) is used to resolve host names to IP addresses.

Submit
34. Which of the following commands can be used to tell you whether port 25 is available on the host edulaney?

Explanation

To see whether port 25 is available, use Telnet, and give it the address and port number to try: telnet www.edulaney.com 25. All the other options will not perform the desired test.

Submit
35. Which of the following protocols operate at the TCP/IP host-to-host layer? (Choose all that apply.)

Explanation

TCP operates at the host-to-host layer of the TCP/IP architecture, and UDP operates at the host-to-host layer of the TCP/IP architecture. SMTP operates at the application layer of the TCP/IP architecture. IP operates at the Internet layer of the TCP/IP architecture.

Submit
36. Which of the following protocols does not operate at the Internet layer of the TCP/IP architecture?

Explanation

Routing Information Protocol (RIP) operates at the application layer of the TCP/IP architecture. All the other options operate at the Internet layer.

Submit
37. Which technology is not used to provide backward compatibility with 802.11b?

Explanation

Three technologies are used with the 802.11 standard to provide backward compatibility with 802.11b: Direct-Sequence Spread Spectrum (DSS), Orthogonal Frequency Division Multiplexing (ODFM), and Frequency-Hopping Spread Spectrum (FHSS). EGRP is a routing protocol and not used to provide backward compatibility with 802.11b.

Submit
38. Which of the following standards provides wireless LAN bandwidth of up to 54Mbps in the 5GHz spectrum?

Explanation

The 802.11a standard provides wireless bandwidth of up to 54Mbps in the 5GHz spectrum. The 802.11 standard defines wireless LANs transmitting at 1Mbps or 2Mbps using the 2.4GHz spectrum. The 802.11b standard provides for bandwidth up to 11Mbps in the 2.4GHz spectrum. The 802.11g standard provides for bandwidth up to 54Mbps in the 2.4GHz frequency spectrum.

Submit
39. Which well-known UDP port is used for an SNMP trap?

Explanation

Simple Network Management Protocol (SNMP) uses port 161, while traps use port 162. Port 137 is used by the NetBIOS name service. Port 138 is used by the NetBIOS datagram service.

Submit
40. Which type of firewall passes or blocks traffic to specific addresses based on the type of application?

Explanation

A packet filter firewall passes or blocks traffic to specific addresses based on the type of application. A stateful inspection firewall keeps records, in a state table, and tracks every communication channel. A proxy firewall intercepts and examines all packets between the internal and external networks. There is no such firewall type as ACPI.

Submit
41. Which of the following terms is used to denote listening in on an existing wireless network using commercially available technologies?

Explanation

A site survey involves listening in on an existing wireless network using commercially available technologies. Doing so allows intelligence, and possibly data capture, to be performed on systems in your wireless network. The other terms listed do not imply listening in on an existing wireless network using commercially available technologies.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 03, 2011
    Quiz Created by
    Joelcg
Cancel
  • All
    All (41)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is a protocol/service used to transfer files...
Which of the following is a Class C private address?
Which of the following is a private internal network implemented and...
Which protocol is an anonymous version of FTP?
Which of the following is a protocol/service used to resolve host...
Which of the following is not a valid private address?
Which of the following is a private network that also includes outside...
In a three-way handshake, what is the second message sent?
Which of the following is a protocol/service that allows remote users...
Which of the following is a device that captures and displays network...
Which of the following is a Class B private address?
Which of the following is a Class A private address?
Which of the following is the process of monitoring data that is...
In a three-way handshake, what is the first message sent?
Which well-known UDP port is used for standard SNMP traffic?
Which of the following is an area where public server access is made...
Which protocol is a favorite for DoS attacks?
What application interface does a Windows-based operating system use...
Which protocol is used to report errors and reply to requests from...
In a three-way handshake, what is the third message sent?
Which of the following protocols does not operate at the application...
Which well-known UDP port is used by the NetBIOS name service?
Which of the following is the most recent version of SNMP?
Which of the following standards provides wireless LAN bandwidth of...
Which of the following protocols operate at the TCP/IP application...
What type of broadcast is used in a smurf attack?
To increase security on your server, you are replacing FTP with Secure...
Which well-known UDP port is used by the NetBIOS datagram service?
Which of the following protocols operate at the TCP/IP Internet layer?
Which of the following standards provides wireless LAN bandwidth of up...
Which of the following is the default file-sharing protocol for...
Which port is used for the FTP control channel?
Which of the following is a protocol/service used to verify that...
Which of the following commands can be used to tell you whether port...
Which of the following protocols operate at the TCP/IP host-to-host...
Which of the following protocols does not operate at the Internet...
Which technology is not used to provide backward compatibility with...
Which of the following standards provides wireless LAN bandwidth of up...
Which well-known UDP port is used for an SNMP trap?
Which type of firewall passes or blocks traffic to specific addresses...
Which of the following terms is used to denote listening in on an ...
Alert!

Advertisement