Question

ANY ANSWER IS APPRECIATED Which of the following protocols are related to sending or receiving email?...

ANY ANSWER IS APPRECIATED

  1. Which of the following protocols are related to sending or receiving email? (Choose two)

    TFTP

    POP3

    NNTP

    IRC

    SMTP

1 points   

QUESTION 2

  1. Which of the following best describes a data packet?

    A numbered designation of a particulat connection point or communication pathway

    Group of bytes to be sent between two devices on a network

    A set of rules used to communicate information

    A binary equivalent to a street address

1 points   

QUESTION 3

  1. Choose the network component that connects other devices to a network

    Router

    Switch

    Pub

    DataCom

1 points   

QUESTION 4

  1. The chief characteristic of a Smurf attack is that an attacker

    Uses a "cannon" to send an extremely large packet to overwhelm a target device

    Requests that a huge amount of devices send ICMP responses to a target IP address

    Requests a huge number of connections that they have no intention of completing, effectively overhelming the target's resources

    Uses the Smurf virus to cause a buffer overflow in the network software of a target

1 points   

QUESTION 5

  1. The Internet was designed to scale to nearly unlimited connected devices - How does this relate to common network attacks?

    It doesn't - Any one network device can only receive traffic from one other device at a time

    Having so many devices on the Internet makes it tougher to target any single specific device

    Many network attacks rely on tricking a large number of devices to target and overwhelm a single device or network

    As the Internet grows larger, it makes it more difficult for an attacker to scan all of the available IP addresses - This causes a reduction in the number of attacks they can launch

1 points   

QUESTION 6

  1. Choose the network component that is used to connect two or more networks

    Router

    Switch

    Hub

    DataCom

1 points   

QUESTION 7

  1. What drawback of older protocols like Ethernet or IPv4 allow attackers to "spoof" or forge packets with the source address of another device?

    Ethernet and IPv4 allow for using up to 5 source addresses

    Ethernet and IPv4 allow packets to be created with any source address, with no verification

    Ethernet and IPv4 don't enforce maximum packet sizes, making it possible to include additional source addresses in a data packet

    Ethernet and IPv4 do authenticate source addresses, but attackers have cracked the process because it is old

1 points   

QUESTION 8

  1. True or False - Because the predecessor of the Internet was developed for the Department of Defense, advanced security measures were built into the main protocols used on the Internet

    True

    False

1 points   

QUESTION 9

  1. Protocols like Ethernet and IPv4 do not protect the confidentiality of the data they carry - This makes them susceptible to

    Cracking

    Hashing

    Flooding

    Eavesdropping

1 points   

QUESTION 10

  1. The chief characteristic of a SYN flood attack is that an attacker

    Uses a "cannon" to send an extremely large packet to overwhelm a target device

    Requests that a huge amount of devices send ICMP responses to a target IP address

    Requests a huge number of connections that they have no intention of completing, effectively overhelming the target's resources

    Uses the Smurf virus to cause a buffer overflow in the network software of a target

Homework Answers

Answer #1

Please find the answers as the following

(1) POP3,SMTP

(2) Group of bytes to be sent between two devices on a network

(3) Switch

(4) Requests that a huge amount of devices send ICMP responses to a target IP address

(5) Many network attacks rely on tricking a large number of devices to target and overwhelm a single device or network

(6) Router

(7) Ethernet and IPv4 allow packets to be created with any source address, with no verification

(8) False

(9) Flooding

(10) Requests a huge number of connections that they have no intention of completing, effectively overwhelming the target's resources

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
1. a. Which of the following services could not be provided to a flow of packets...
1. a. Which of the following services could not be provided to a flow of packets between a given source and destination? A. In-order packet delivery B. Guaranteed maximum bandwidth C. Guaranteed maximum jitter D. Security services b. In the following protocols, which group is used extensively for routing within an autonomous system in the Internet? A. The Routing Information Protocol (RIP) and IS-IS protocol B. The IS-IS protocol and Open Shortest Path First (OSPF) C. The Routing Information Protocol...
Provide a summary of the article below (200-400 words) that includes/addresses the following: Why you selected...
Provide a summary of the article below (200-400 words) that includes/addresses the following: Why you selected this article. Describe at least two things you learned from the article including how they add to your knowledge of Global Information Technology. 5G vs. 4G Cellular Technology: What Businesses Need to Know 5G networks are rolling out worldwide. Verizon, AT&T, Comcast, T-Mobile, and Sprint are among the leading 5G internet service providers. Mobile and fixed 5G services are still limited in geographic reach,...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of the separation is that they are not displayed by the default version of the ls command)                         a. the prefix "rc" (rc.filename)               c. the extension .cfig                         b. a dot (.) at the beginning                    d. by having the SUID bit set 2. The IP address which is reserved for local loopback (equivalent to "localhost") is:                         a. 255.255.255.0                                   c. 192.168.70.1...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT