Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 1, Page 40 Prof. Michael P. Harris ITSY 2430 Intrusion Detection Name: __________________ Chapter Quiz 01 Date: ________ Chapter Review Questions, Network Defense Fundamentals 1. What advantages does IPv6 have over IPv4? (Choose all that apply.) 2. Which of the following is a method of hiding internal host IP addresses? (Choose all that apply.) 3. A Class C address has a first octet decimal range of ___________ to ___________. 4. Class D addresses are reserved for experimentation. True or False? 5. The reserved Class A address 127.0.0.1 is used for which of the following? 6. What are the primary subdivisions of an IP datagram? (Choose all that apply.) 7. Fragmentation of IP packets causes several security problems. How should you configure the firewall or packet filter to prevent harm from fragmented packets? (Choose all that apply.) Page 1 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 1, Page 40 Prof. Michael P. Harris 8. Most network intrusions originate from what location? 9. Why is UDP considered unreliable? 10. A DNS server translates _____________ to ______________________. 11. How can DNS help network administrators? 12. DNS is vulnerable to what types of attacks? (Choose all that apply) 13. What kind of network communication requires a third-party program rather than a firewall or an IDS to scan for viruses or harmful executables? 14. What are some of the reasons for network attacks? (Choose all that apply.) Page 2 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 1, Page 40 Prof. Michael P. Harris 15. A port number combined with a computer’s IP address constitutes a network connection called a(n) _________________. 16. Why is fragmentation considered a security risk? 17. The ability to prevent one participant in an electronic transaction from denying that it performed an action is called _____________. 18. Firewall enforcement of policies is handled primarily through setting up packet-filtering rules, a set of which is contained in the ______________________. 19. Servers with outside access to the public should never be located where? 20. The signs of possible attacks detected by an IDS are commonly called signatures. What information do signatures contain? (Choose all that apply.) Page 3 of 3