Point to Point Protocol & Error Detection

The section contains computer network questions and answers on point to point protocol & error detection, a TCP/IP protocol that is used to connect one computer system to another and computers use PPP to communicate over the telephone network or the Internet. A PPP connection exists when two systems physically connect through a telephone line.

Start Quiz

Which of the following is an advantage of anomaly detection?

Rules are easy to define Custom protocols can be easily analyzed The engine can scale as the rule set grows Malicious activity that falls within normal usage patterns is detected

One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?

Inside the firewall Outside the firewall Both inside and outside the firewall Neither inside the firewall nor outside the firewall.

What is the purpose of a shadow honeypot?

To flag attacks against known vulnerabilities To help reduce false positives in a signature-based IDS To randomly check suspicious traffic identified by an anomaly detection system To enhance the accuracy of a traditional honeypot

At which two traffic layers do most commercial IDSes generate signatures?

Application layer and Network layer Network layer and Session Layer Transport layer and Application layer Transport layer and Network layer

IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?

Inspection of password files to detect inadvisable passwords Mechanisms put in place to reenact known methods of attack and record system responses Inspection of system to detect policy violations Inspection of configuration files to detect inadvisable settings

Which of the following is used to provide a baseline measure for comparison of IDSes?

Crossover error rate False negative rate False positive rate Bit error rate

When discussing IDS/IPS, what is a signature?

An electronic signature used to authenticate the identity of a user on the network Attack-definition file It refers to “normal,” baseline network behavior It is used to authorize the users on a network

“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?

Application layer and Transport layer Network layer and Application layer Session layer and Transport layer Application layer and Session layer

Which of the following is true of signature-based IDSes?

They alert administrators to deviations from “normal” traffic behavior They identify previously unknown attacks The technology is mature and reliable enough to use on production networks They scan network traffic or packets to identify matches with attack-definition files

Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.

Modem Cable Hub Router None of the above

A false positive can be defined as ________.

An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior

An alert that indicates nefarious activity on a system that is not running on the network

The lack of an alert for nefarious activity

Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network

Which of the following is not a disadvantage of wireless LAN?

Slower data transmission

Higher error rate

Interference of transmissions from different computers

All of the above

The Internet Control Message Protocol (ICMP),

Allows gateways to send error a control messages to other gateways or hosts

Provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another

Reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem

All of the above

None of the above

Which of the following is used for modulation and demodulation?

Modem

Protocols

Gateway

Multiplexer

None of the above

The term duplex refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiver,

Cannot talk at once

Can receive and send data simultaneously

Can send or receive data one at a time

Can do one way data transmission only

None of the above

Quiz/Test Summary
Title: Point to Point Protocol & Error Detection
Questions: 15
Contributed by:
Steve