Exam 9: Introduction to Network Security
Match each item with a statement below:
-a series of letters,numbers,and special characters,much like a password,that both communicating devices use to authenticate each other's identity
E
Briefly describe three of the seven elements of a network security policy.
Privacy policy-Describes what staff,customers,and business partners can expect for monitoring and reporting network use. Acceptable use policy-Explains for what purposes network resources can be used. Authentication policy-Describes how users identify themselves to gain access to network resources.Logon names,password conventions,and authentication methods should be described. Internet use policy-Explains what constitutes proper or improper use of Internet resources. Access policy-Specifies how and when users are allowed to access network resources.Policies should exist for both onsite and remote access to the network. Auditing policy-Explains the manner in which security compliance or violations can be verified and the consequences for violations. Data protection-Outlines the policies for backup procedures,virus protection,and disaster recovery.
What is a penetration tester?
A penetration tester is a person who is skilled in the art of breaking into a network to find where the network is vulnerable for the purposes of advising a company on how to be more secure.
Match each item with a statement below:
-used to discover breaches in security
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge.It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
A security policy should clearly state the desired rules,even if they cannot be enforced.
Match each item with a statement below:
-inspects packets as they go into and out of the network
Where should a NIDS be placed to protect the entire network?
What process,available on most routers,will help improve security by masking the internal IP address of the transmitting device?
What type of policy defines the methods involved when a user logs on to the network?
Which of the following is a tool used to determine what possible points of entry exist that are open and vulnerable on your system?
You don't need to physically secure your servers as long as you use a good strong password for your accounts.
_____________ procedures for all data that can't be reproduced easily should be in place,and a disaster recovery procedure must be devised and carried out.
Physically securing your switches isn't necessary because users will not know how to access them.
Which protocol is used to encrypt data as it travels a network?
____________ authentication means the identity of both parties is verified.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)