Exam 9: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below: ​ -a series of letters,numbers,and special characters,much like a password,that both communicating devices use to authenticate each other's identity

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

E

Briefly describe three of the seven elements of a network security policy.

Free
(Essay)
4.9/5
(31)
Correct Answer:
Verified

Privacy policy-Describes what staff,customers,and business partners can expect for monitoring and reporting network use. Acceptable use policy-Explains for what purposes network resources can be used. Authentication policy-Describes how users identify themselves to gain access to network resources.Logon names,password conventions,and authentication methods should be described. Internet use policy-Explains what constitutes proper or improper use of Internet resources. Access policy-Specifies how and when users are allowed to access network resources.Policies should exist for both onsite and remote access to the network. Auditing policy-Explains the manner in which security compliance or violations can be verified and the consequences for violations. Data protection-Outlines the policies for backup procedures,virus protection,and disaster recovery.

What is a penetration tester?

Free
(Essay)
4.8/5
(31)
Correct Answer:
Verified

A penetration tester is a person who is skilled in the art of breaking into a network to find where the network is vulnerable for the purposes of advising a company on how to be more secure.

a self-contained,self-replicating program

(Short Answer)
4.9/5
(34)

Match each item with a statement below: ​ -used to discover breaches in security

(Multiple Choice)
4.9/5
(34)

What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?

(Multiple Choice)
4.7/5
(37)

How should a room that is going to house your servers be equipped?

(Essay)
4.9/5
(38)

Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge.It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.

(Multiple Choice)
4.8/5
(42)

A security policy should clearly state the desired rules,even if they cannot be enforced.

(True/False)
5.0/5
(38)

Match each item with a statement below: ​ -inspects packets as they go into and out of the network

(Multiple Choice)
4.9/5
(41)

Where should a NIDS be placed to protect the entire network?

(Multiple Choice)
4.8/5
(39)

What process,available on most routers,will help improve security by masking the internal IP address of the transmitting device?

(Multiple Choice)
4.8/5
(40)

What type of policy defines the methods involved when a user logs on to the network?

(Multiple Choice)
4.8/5
(36)

Which of the following is a tool used to determine what possible points of entry exist that are open and vulnerable on your system?

(Multiple Choice)
4.8/5
(29)

You don't need to physically secure your servers as long as you use a good strong password for your accounts.

(True/False)
4.9/5
(38)

What is the difference between a virus and a worm?

(Essay)
4.8/5
(26)

_____________ procedures for all data that can't be reproduced easily should be in place,and a disaster recovery procedure must be devised and carried out.

(Short Answer)
4.8/5
(40)

Physically securing your switches isn't necessary because users will not know how to access them.

(True/False)
4.8/5
(32)

Which protocol is used to encrypt data as it travels a network?

(Multiple Choice)
4.9/5
(43)

____________ authentication means the identity of both parties is verified.

(Short Answer)
4.9/5
(34)
Showing 1 - 20 of 51
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)