Exam 9: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Firewall rules can be based on which of the following properties? (Choose all that apply.)

(Multiple Choice)
4.8/5
(37)

Match each item with a statement below: ​ -spreads by replicating itself into programs or documents

(Multiple Choice)
4.8/5
(31)

What is a network security policy?

(Essay)
4.8/5
(40)

Which VPN implementation needs no additional configuration to be allowed access through a firewall?

(Multiple Choice)
4.9/5
(38)

Which of the following can be used to secure data on disk drives? (Choose all that apply.)

(Multiple Choice)
4.7/5
(39)

What are the complexity requirements for a Windows password? List the four characteristics.

(Essay)
4.9/5
(31)

Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)

(Multiple Choice)
4.8/5
(46)

____________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.

(Short Answer)
4.9/5
(36)

Match each item with a statement below: ​ -time-dependent malware that can come in different forms.Its main characteristic is that it's activated when a particular event occurs

(Multiple Choice)
4.8/5
(25)

Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

(Multiple Choice)
4.8/5
(35)

A Trojan horse is a self-replicating program that masks itself as a useful program but is actually a type of malware.

(True/False)
4.8/5
(20)
Showing 41 - 51 of 51
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)