978-0840020932 Chapter 9

subject Type Homework Help
subject Pages 4
subject Words 1067
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 9: Hacking Network Devices
TRUE/FALSE
1. Networking devices allow the computers on a network to interact with each other.
2. A proxy server is hard to use since it is usually not included in router or firewall software.
3. The user interacting via the proxy server is hidden, but can be traced through the log stored on the proxy
server.
4. Routers and switches both segment a network, and all can filter packets.
5. Hackers can perform many attacks on routers and switches even if they cannot get into the building and
set themselves up as a system administrator.
MULTIPLE CHOICE
1. A network can be divided into two main areas: networking software and networking ____.
a.
agents
c.
programs
b.
devices
d.
robots
2. Networking software can be divided into three categories: security software, ____ software, and
transport software.
a.
presentation
c.
connection
b.
routing
d.
linking
3. The attacks made through proxy servers include buffer overflow attacks, denial-of-service attacks, and
____ attacks.
a.
session-hijacking
c.
switch cracking
b.
password cracking
d.
router hijacking
4. ____ are a form of logical network segmentation.
a.
VPNs
c.
VEs
b.
VRNs
d.
VLANs
page-pf2
5. ____ are often considered the ultimate one-point solution for securing networks from both internal and
external threats.
a.
VPNs
c.
Firewalls
b.
Routers
d.
Switches
COMPLETION
1. The default password for Cisco routers is ____________________.
2. In a(n) ____________________ attack, the hacker transmits a large quantity of packets to the router for
it to determine an effective and efficient path for transfer.
3. ____________________ works like a DoS, but the attack comes from many IP addresses, so the defense
is more complicated.
4. To decide the quickest, most efficient path for a packet to reach its destination, a(n)
____________________ is maintained within a router.
5. The main function of a(n) ____________________ is to centralize access control for the network by
keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious
code from entering a network.
SHORT ANSWER
page-pf3
1. What are some of the functions performed by proxy servers?
2. Why should you configure different admin passwords for all your routers and switches?
3. What are the categories of firewall attacks?
4. Describe the root access method of attacking a firewall.
page-pf4
5. What are some of the threats through VPNs?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.