DataComm Ch19 Quiz

Which of the following is not a builtin function of legitimate software, but needs another piece of software to replicate/activate?
Virus
Worm
Macro
Trojan
At which layer of the OSI model does stateful packet filtering take place at?
Two
Three
Four
Seven
Which of the following allows for the hiding of network IPs?
PAT
NAT
Port filtering
MAC filtering
If user1 has read access for a particular folder and is also part of a group which is denied access to that folder, what are user1’s effective permissions on the folder?
Read
Write
Read and write
No access
A smurf attack is which type of attack?
DOS
Man-in-the-middle
Social engineering
Leaching
Which of the following is used to obscure the contents of a packet as it travels across the internet?
PAT
Hiding the IP address
Encryption
NAT
 
Which account has elevated privileges on a Linux box? (hint: also the name of a character on Person of Interest)
Administrator
Guest
Root
Power user
If user1 has read access for a particular folder and is also part of a group which has full control access to that folder, what are user1’s effective permissions on the folder?
Read and write
Full control
Write
No access
All of the following can help prevent physical intrusion except _________.
RFID
Retinal scan
RAID
Door locks
Personal authentication typically entails any or all the following except _________.
Something you know
Something you have
Something you are
Someone you know
{"name":"DataComm Ch19 Quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which of the following is not a builtin function of legitimate software, but needs another piece of software to replicate\/activate?, At which layer of the OSI model does stateful packet filtering take place at?, Which of the following allows for the hiding of network IPs?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker