Exam 1: Introduction to Network Security
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
Those who exploit systems for harm such as to erase files,change data,or deface Web sites are typically called:
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
D
Which approach to security is proactive in addressing potential threats before they occur?
Free
(Multiple Choice)
5.0/5
(36)
Correct Answer:
C
The process of determining whether the credentials given by a user are authorized to access a particular network resource is called:
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
D
Which of the following is NOT a connectivity device used to connect machines on a network?
(Multiple Choice)
4.9/5
(32)
____________ is a type of attack where header information on data packets is changed to provide false information.
(Short Answer)
4.7/5
(33)
The first computer incident-response team was sponsored by ____________ University.
(Short Answer)
4.7/5
(36)
Which term is generally used by hackers to refer to attempts at intrusion into a system without permission and usually for malevolent purposes?
(Multiple Choice)
4.9/5
(33)
Which of the following maintains a repository for information on virus outbreaks and detailed information about specific viruses?
(Multiple Choice)
4.9/5
(35)
Since they are easier to perpetrate than intrusions,____________ attacks are the most common form of attack after viruses.
(Short Answer)
4.8/5
(28)
A term used to describe calling numerous telephone numbers,usually sequentially,in hopes of reaching a computer to attempt to hack into is called ____________.
(Short Answer)
4.9/5
(36)
Flooding a system with many false connection attempts in an effort to prevent legitimate use is an example of a ____________ attack.
(Short Answer)
4.7/5
(31)
An attack characterized by an explicit attempt by attackers to prevent legitimate users from accessing a system is called:
(Multiple Choice)
4.8/5
(40)
The process of reviewing logs,records,and procedures to determine whether they meet appropriate standards is called:
(Multiple Choice)
4.8/5
(32)
Another name for an ethical hacker operating legally and with permission is ____________.
(Short Answer)
4.8/5
(29)
____________ refers to a process used to locate wireless networks that might be vulnerable to attack.
(Short Answer)
4.8/5
(28)
What is a technique used to determine if someone is trying to falsely deny that they performed a particular action?
(Multiple Choice)
4.9/5
(43)
In addition to mandating federal agencies to establish security measures,the Computer Security Act of 1987 defined important terms such as:
(Multiple Choice)
4.9/5
(33)
Which is a technique used to provide false information about data packets?
(Multiple Choice)
4.9/5
(35)
Encryption and virtual private networks are techniques used to secure which of the following?
(Multiple Choice)
4.9/5
(42)
Which is NOT one of the three broad classes of security threats?
(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)