Featured post

IBPS SO IT TRICKS TO GET FULL MARKS

JOIN GROUP-  https://www.facebook.com/groups/bankibpssoit/ If you wish to get full marks in IBPS SO IT . We will provide you the gui...

IBPS - SO - IT - 2016 - 2017 - Networking Security Question solve



1.) This is a standard for security that is located at the network or packet-processing layer of network communications, as opposed to the application layer.
a. SSL
b. TCP
c. S-HTTP
d. passive FTP
e. IPsec

2.) When fending off an attack, this is a method of monitoring network traffic that involves forwarding a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied.
a. port mirroring
b. emanation monitoring
c. network scanning
d. footprinting
e. hijacking
[ Port mirroring is an approach to monitoring network traffic that involves forwarding a copy of each packet from one network switch port to another.]
[Footprinting is the process of accumulating data regarding a specific network environment, usually for the purpose of finding ways to intrude into the environment. ]

3.) This is a common type of denial-of-service attack that involves sending more traffic to a network address than the temporary data storage area is intended to hold, thereby shutting down the service and possibly corrupting or overwriting valid data.
a. war dialing
b. buffer overflow
c. smurf attack
d. ping sweep
e. bucket brigade
[A war dialer is a computer program used to identify the phone numbers that can successfully make a connection with a computer modem.]
[A buffer overflow occurs when a program or process attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold.]
[ A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service. ]
[ A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).]
[ A bucket brigade attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting their own public key for the requested one, so that the two original parties still appear to be communicating with each other directly. ]

4.) This is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network.
a. firewall
b. VPN
c. man in the middle
d. DMZ
e. sheepdip computer
[ A firewall acts as a barrier between a trusted network and and an untrusted network]
[ A virtual private network (VPN) is a technology that creates an encrypted connection over a less secure network.]
Man in the middle is one in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.]
[  DMZ (demilitarized zone) is a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.  ]
[a sheepdip  is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.]

5.) This is one of the older and slower methods an intruder might use to scan a network to determine which of a range of IP addresses map to live hosts.
a. smurfing
b. brute force cracking
c. phreaking
d. ping sweep
e. war driving

6.) This is a firewall facility that can monitor the state of active connections and use this information to determine which network packets to allow through the firewall.
a. ICMP sweep
b. dynamic packet filter
c. roving analysis port
d. logic bomb
e. static packet filter

7.) This is a computer system on the Internet that is expressly set up to attract and "trap" intruders.
a. exploit
b. demilitarized zone
c. Trojan horse
d. snoop server
e. honeypot

8.) This is the transmission of data through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
a. tunneling
b. virtual private network
c. output feedback
d. chaffing
e. promiscuous mode
[Tunneling, also known as "port forwarding," is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network. ]

9.) This occurs when a multitude of compromised systems attack a single targeted system, thereby causing the target system to shut down.
a. denial of service
b. global spy network
c. cipher block chaining
d. distributed denial-of-service attack
e. social engineering
[ A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.]


10.) This allows remote workers to have secure access to their organization's network while using a public telecommunication infrastructure, such as the Internet.
a. shoulder surfing
b. Wingate
c. VPN
d. hot site
e. intrusion detection system

2 comments:

  1. It was really nice to read article written on this blog. I would also like to add few techniques with best of my knowledge which can help reader more and more.
    Cisco SG220

    ReplyDelete
  2. I am thankful for this blog to gave me much knowledge regarding my area of work. I also want to make some addition on this platform which must be in knowledge of people who really in need. Thanks.Cisco SF220 POE

    ReplyDelete

You will get Reply with in 24 hours