Exam 9: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which facet of securing access to network data makes data unusable to anyone except authorized users?

(Multiple Choice)
4.7/5
(32)

Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.

(Essay)
4.8/5
(47)

What is an IDS?

(Essay)
4.7/5
(25)

What type of device should you install as a decoy to lure potential attackers?

(Multiple Choice)
4.8/5
(37)

Match each item with a statement below: ​ -packets are denied on context as well as packet properties

(Multiple Choice)
4.8/5
(43)

What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?

(Multiple Choice)
4.7/5
(29)

What are the two VPN modes that are available with most VPN servers?

(Short Answer)
4.8/5
(29)

What is a VPN?

(Essay)
5.0/5
(30)

How the network resources are to be used should be clearly defined in a (an)____________ policy.

(Short Answer)
5.0/5
(39)

Match each item with a statement below: ​ -permits access to computer,bypasses normal authentication

(Multiple Choice)
4.7/5
(39)

What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?

(Multiple Choice)
4.9/5
(38)

Which of the following is NOT a guideline of a security policy?

(Multiple Choice)
4.8/5
(34)

When using BitLocker to encrypt your entire disk,which mode must you use if your system is not configured for TPM support?

(Multiple Choice)
4.7/5
(28)

If the minimum password length on a Windows system is set to zero,what does that mean?

(Multiple Choice)
4.8/5
(27)

Match each item with a statement below: ​ -monopolizes network services or network bandwidth

(Multiple Choice)
4.9/5
(30)

Which of the following is a protocol that centralizes authentication,authorization,and accounting?

(Multiple Choice)
4.9/5
(41)

Match each item with a statement below: ​ -documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority

(Multiple Choice)
4.8/5
(34)

Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?

(Multiple Choice)
4.7/5
(29)

A DoS attack ties up network bandwidth or services,rendering resources useless to legitimate users.

(True/False)
4.8/5
(38)

Removal of ______________ is very difficult because they alter system files and drivers the system depends on to run.

(Short Answer)
4.8/5
(30)
Showing 21 - 40 of 51
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)