Quiz

1/What is a multiple-packet attack and what is needed by an IDPS to detect one?  Provide an example.

2/ List the seven layers of the OSI model, and give an example of what each one does in a real-world environment.

3/ What are the signatures of malformed packets that misuse the SYN and FIN flags?  Briefly describe each.

4/What is a Feistel network and what is its purpose?

5/Compare and contrast block cipher with stream cipher.

6/What is a MAC tag and how does it work?

7/Describe 802.1x authentication.

8/Describe forged deauthentication.

9/Discuss how an ESS works.

10/Why should you use caution when using multiple APs?

11/Compare and contrast analog and digital RF signals.

12/Describe the purpose of the CVE and how it works.

13/Discuss defense in depth.

For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).

14/Discuss variable length subnet masking.

15/What is a distance-vector routing protocol?  Give one example.

LOOKING FOR HELP WITH YOUR ESSAYS? LET OUR EXPERT WRITERS HELP YOU ACE YOUR PAPER WITH ANY DEADLINE OF YOUR CHOICE. ORDER NOW FOR 15% DISCOUNT