End of Chapter Solutions Template

advertisement
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 1, Page 40
Prof. Michael P. Harris
ITSY 2430 Intrusion Detection
Name: __________________
Chapter Quiz 01
Date: ________
Chapter Review Questions, Network Defense Fundamentals
1. What advantages does IPv6 have over IPv4? (Choose all that apply.)
2. Which of the following is a method of hiding internal host IP
addresses? (Choose all that apply.)
3. A Class C address has a first octet decimal range of ___________ to
___________.
4. Class D addresses are reserved for experimentation. True or False?
5. The reserved Class A address 127.0.0.1 is used for which of the
following?
6. What are the primary subdivisions of an IP datagram? (Choose all
that apply.)
7. Fragmentation of IP packets causes several security problems. How
should you configure the firewall or packet filter to prevent harm
from fragmented packets? (Choose all that apply.)
Page 1 of 3
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 1, Page 40
Prof. Michael P. Harris
8. Most network intrusions originate from what location?
9. Why is UDP considered unreliable?
10. A DNS server translates _____________ to ______________________.
11. How can DNS help network administrators?
12. DNS is vulnerable to what types of attacks? (Choose all that apply)
13. What kind of network communication requires a third-party program
rather than a firewall or an IDS to scan for viruses or harmful
executables?
14. What are some of the reasons for network attacks? (Choose all that
apply.)
Page 2 of 3
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 1, Page 40
Prof. Michael P. Harris
15. A port number combined with a computer’s IP address constitutes a
network connection called a(n) _________________.
16. Why is fragmentation considered a security risk?
17. The ability to prevent one participant in an electronic transaction
from denying that it performed an action is called _____________.
18. Firewall enforcement of policies is handled primarily through setting
up packet-filtering rules, a set of which is contained in the
______________________.
19. Servers with outside access to the public should never be located
where?
20. The signs of possible attacks detected by an IDS are commonly
called signatures. What information do signatures contain? (Choose
all that apply.)
Page 3 of 3
Download