Preview

3220 final review

Powerful Essays
Open Document
Open Document
655 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
3220 final review
IS3220 Final review

1. What can you detect by analyzing a data packet?

2. What kind of data does NetWitness Investigator inspect?

3. What is used by TCP to establish a session between two systems? 69, 121

4. Name a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?65, 69

5. Promiscuous mode is most commonly associated with which physical device on a computer?

6. True or false, privacy is a primary objective of information security. 6

7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of what? 9

8. Which security group is responsible for managing network vulnerabilities and threats? 12

9. Which network component filters traffic between nodes? 44

10. Which is the most important consideration when designing a network? 10

11. What is usually the first activity in the hacking process? 119

12. What services might a hacker offer as a service? 113

13. Which IT domains is most vulnerable to social engineering? 115

14. What type of attack can result in arbitrary code execution with system-level privileges? 134

15. Name 3 social engineering techniques. 129, 144, 145

16. Which domain marks the boundary where the private network meets the public network? 152

17. A port scanner is a type of vulnerability assessment scanner. (T/F)

18. What data is covered by a data loss/data leak prevention tool? 22, 15

19. What is the purpose of network analysis? Chapter 1

20. Where do you capture network data to analyze inbound/outbound network traffic? Chapter 1

21. What can you accomplish by filtering network packets?69

22. What kinds of data is addressed by stateful firewalls? 69, 70, 73

23. What does an application-level proxy do? 70, 71

24. Which is a problem for static filtering? 69

25. What type of firewall keeps track of state tables to sieve network

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network?…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Pearlman, R. (1999). Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd ed.). : Addison-Wesley .…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    Answer: 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. Describe the three modes of communication available on a network. (Minimum word count: 60)…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    7. Find a TCP 3-way handshake for a TELNET session. What is the significance of the TCP 3-way handshake?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Labs 3.1-3.4

    • 1882 Words
    • 9 Pages

    1. Why would a three-layer model of communication that has the layers physical, network, and application be insufficient to adequately describe network communication?…

    • 1882 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    1.3 - Explain the purpose of legal and organizational requirements for the security and confidentiality of information…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Study Guide Data Comm

    • 1683 Words
    • 7 Pages

    _____3. Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?…

    • 1683 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    3220 Unit 5 complete

    • 1433 Words
    • 5 Pages

    Christine Brooks, the regional claims manager for the national insurance company for Westchester zone (Rosenberg, 2003). Christine was in charge of implementing this major zone reorganization in which four offices under her responsibility would be consolidated to one location by the end of the year. This reorganization was due to deregulation and continuous economic weakness, company had decided to the cost-cutting moves for some regional areas and one of which included the Westchester zone reorganization. There were many factors which were associated with the case of national insurance company as financial gain, cost-cutting budgets, and down-sizing (Banerjee, 2002).…

    • 1433 Words
    • 5 Pages
    Satisfactory Essays