Network Security Midterm Exam - 1009 Verified Questions

Page 1


Network Security

Midterm Exam

Course Introduction

Network Security explores the principles and practices essential for protecting data and resources on computer networks. The course covers fundamental topics such as cryptography, authentication, and access control, as well as advanced techniques for defending against threats like malware, denial-of-service attacks, and intrusion detection. Students will learn about security protocols, firewall architectures, VPNs, and strategies for securing wireless and cloud-based environments. By integrating theoretical concepts with practical applications, the course equips students with the knowledge and skills to design, implement, and manage secure network infrastructures in diverse organizational settings.

Recommended Textbook

Business Data Networks and Security 11th Edition by Raymond R. Panko

Available Study Resources on Quizplus

12 Chapters

1009 Verified Questions

1009 Flashcards

Source URL: https://quizplus.com/study-set/2197 Page 2

Chapter 1: Core Network Concepts and Terminology

Available Study Resources on Quizplus for this Chatper

68 Verified Questions

68 Flashcards

Source URL: https://quizplus.com/quiz/43742

Sample Questions

Q1) An IP packet may include a(n)________.

A) application message or fragment

B) TCP segment or UDP datagram

C) both A and B

D) neither A nor B

Answer: C

Q2) A host sends a packet to another host containing six single networks along the way.How many data links are used for this transmission?

A) 1

B) 6

C) 7

D) 8

Answer: B

Q3) Who owns the Internet?

A) The U.S. Government

B) The United Nations

C) The IETF

D) No one

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Network Standards

Available Study Resources on Quizplus for this Chatper

112 Verified Questions

112 Flashcards

Source URL: https://quizplus.com/quiz/43743

Sample Questions

Q1) If you change a standard at one layer,you are not required to change standards at other layers.

A)True

B)False

Answer: True

Q2) Which of the following is an architecture?

A) ISO

B) IETF

C) both A and B

D) neither A nor B

Answer: D

Q3) At what layer will you find standards for packets?

A) application

B) data link

C) transport

D) Internet

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Network Management

Available Study Resources on Quizplus for this Chatper

66 Verified Questions

66 Flashcards

Source URL: https://quizplus.com/quiz/43744

Sample Questions

Q1) Routers and switches must support ________.

A) northbound APIs

B) Southbound APIs

C) both A and B

D) neither A nor B

Answer: B

Q2) Throughput is ________.

A) the speed a network actually provides to users

B) a network's rated speed

C) both A and B

D) neither A nor B

Answer: A

Q3) The business benefit of multiplexing is ________.

A) lower cost

B) higher speed

C) avoiding the need to send many transmission links through narrow conduits

D) security

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network Security

Available Study Resources on Quizplus for this Chatper

106 Verified Questions

106 Flashcards

Source URL: https://quizplus.com/quiz/43745

Sample Questions

Q1) In a DDoS attack,a ________ sends messages directly to the victim.

A) botmaster

B) bot

C) command and control server

D) all of the above

Q2) In general,what should an employer do whenever an employee leaves the firm?

A) Their accounts should be disabled instantly

B) They should be given no prior notice that they are being released

C) both A and B

D) neither A nor B

Q3) ________ is the general name for a security flaw in a program.

A) A virus

B) Malware

C) A security fault

D) A vulnerability

Q4) Trojan horses can spread by ________.

A) e-mailing themselves to victim computers

B) directly propagating to victim computers

C) both A and B

D) neither A nor B

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Ethernet 8023switched Lans

Available Study Resources on Quizplus for this Chatper

91 Verified Questions

91 Flashcards

Source URL: https://quizplus.com/quiz/43746

Sample Questions

Q1) How long (in milliseconds)is a clock cycle if I transmit 400 Mbps with four states?

A) 0.000005

B) 0.0025

C) 0.005

D) none of the above

Q2) Optical fiber cords typically have two fiber strands.This is done to allow ________.

A) redundancy

B) total redundancy

C) half-duplex operation

D) full-duplex operation

Q3) What type of switch connects switches to other switches?

A) trunk switches

B) core switches

C) workgroup switches

D) none of the above

Q4) In this book,we use the terms Ethernet and 802.3 interchangeably.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Lans I

Available Study Resources on Quizplus for this Chatper

92 Verified Questions

92 Flashcards

Source URL: https://quizplus.com/quiz/43747

Sample Questions

Q1) ________ have SSIDs.

A) Wireless clients

B) Wireless access points

C) both A and B

D) neither A nor B

Q2) In general,the fewer the channels,________.

A) the greater the likelihood of interference between access points

B) the smaller the individual channels will be

C) both A and B

D) neither A nor B

Q3) Which of the following allows access point transmission two wireless clients simultaneously?

A) CSMA/CA+ACK

B) MIMO

C) MU-MIMO

D) none of the above

Q4) If two products both comply with 802.11 ac,their performance will always be similar.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Wireless Lans II

Available Study Resources on Quizplus for this Chatper

73 Verified Questions

73 Flashcards

Source URL: https://quizplus.com/quiz/43748

Sample Questions

Q1) A security might use SNMP Set commands to ________.

A) change an access point's power

B) collect information to look for a rogue access point

C) both A and B

D) neither A nor B

Q2) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

A) VLANs

B) VPNs

C) 802.1X mode

D) none of the above

Q3) 802.11i 802.1X initial authentication mode was created for ________.

A) corporations with multiple access points

B) residences with a single access point

C) residences with less than eight access points

D) corporations with less than eight access points

Q4) You can test whether an evil twin attack has taken place against your wireless client.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: TCP/IP Internetworking I

Available Study Resources on Quizplus for this Chatper

86 Verified Questions

86 Flashcards

Source URL: https://quizplus.com/quiz/43749

Sample Questions

Q1) In IPv6 addresses before simplification,there are ________ in a field.

A) 4 symbols

B) 16 bits

C) both A and B

D) neither A nor B

Q2) In IPv6,the payload length gives the number of octets in the ________.

A) entire packet

B) entire packet minus the main header

C) entire packet minus the main and extension headers

D) entire packet minus the extension headers

Q3) In IPv4,the ________ field is used to deal with congestion in the Internet.

A) ECN

B) DiffServ

C) time to live

D) header checksum

Q4) In IPv6 address simplification,text characters are expressed in ________.

A) upper case

B) lower case

C) either A or B

D) neither A nor B

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: TCP/IP Internetworking II

Available Study Resources on Quizplus for this Chatper

81 Verified Questions

81 Flashcards

Source URL: https://quizplus.com/quiz/43750

Sample Questions

Q1) NAT is transparent to all applications.

A)True

B)False

Q2) The first stage of IPsec uses the ________ protocol.

A) SSL/TLS

B) AES

C) IKE

D) SHA

Q3) If the subnet ID in an IPv6 address is 32 bits,how long is the routing prefix?

A) 16 bits

B) 32 bits

C) 64 bits

D) none of the above

Q4) Your firm has an 8-bit network part.If you need at least 200 subnets,what must your subnet part size be?

A) 5

B) 6

C) 7

D) 8

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Carrier Wide Area Networks Wans

Available Study Resources on Quizplus for this Chatper

81 Verified Questions

81 Flashcards

Source URL: https://quizplus.com/quiz/43751

Sample Questions

Q1) Which reduces traffic more when sending long files?

A) compression

B) caching

C) both A and B

D) neither A nor B

Q2) Which generation is now bringing speeds of about 10 Mbps?

A) 2G

B) 3G

C) 4G

D) 5G

Q3) DSL offers ________.

A) voice transmission

B) data transmission

C) both A and B

D) neither A nor B

Q4) An MTSO ________.

A) controls cellsites in a cellular system

B) links mobile users to wired telephone customers

C) both A and B

D) neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Networked Applications

Available Study Resources on Quizplus for this Chatper

84 Verified Questions

84 Flashcards

Source URL: https://quizplus.com/quiz/43752

Sample Questions

Q1) Content delivery networks mainly ________.

A) increase transmission speed

B) increase program selection

C) decrease program selection

D) reduce latency

Q2) RTP supports ________.

A) faster transmission speed

B) jitter control

C) both A and B

D) neither A nor B

Q3) SIP is a ________ protocol for VoIP.

A) signaling

B) transport

C) both A and B

D) neither A nor B

Q4) IaaSs own ________.

A) application software

B) servers

C) both A and B

D) neither A nor B

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Appendix: Managing the Security Process

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/43741

Sample Questions

Q1) Compared to ________,________ are more structured.

A) procedures; processes

B) processes; procedures

C) both A and B

D) neither A nor B

Q2) Successful attacks are called ________.

A) breaches

B) compromises

C) both A and B

D) neither A nor B

Q3) Normal incidents are handled by the ________.

A) on-duty staff

B) CSIRT

C) outside consultant

D) FBI

Q4) Which of the following is true?

A) Guidelines must be followed.

B) Guidelines must be considered.

C) both A and B

D) neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook