Exam 9: Introduction to Network Security
Exam 1: Introduction to Computer Networks50 Questions
Exam 2: Network Hardware Essentials49 Questions
Exam 3: Network Topologies and Techapter: Nologies48 Questions
Exam 4: Network Media49 Questions
Exam 5: Network Protocols49 Questions
Exam 6: Ip Addressing50 Questions
Exam 7: Network Reference Models and Standards48 Questions
Exam 8: Network Hardware in Depth50 Questions
Exam 9: Introduction to Network Security50 Questions
Exam 10: Wide Area Networking and Cloud Computing50 Questions
Exam 11: Network Operating System Fundamentals50 Questions
Exam 12: Network Management and Administration50 Questions
Exam 13: The Internet of Things50 Questions
Exam 14: Troubleshooting and Support50 Questions
Select questions type
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
Free
(Essay)
4.8/5
(41)
Correct Answer:
a
A honeypot is configured to entice attackers and allows administrators to get information about the attack techniques being used.
Free
(True/False)
4.8/5
(41)
Correct Answer:
True
____________ define the level of access a user has to the file system, ranging from read access to full control.
Free
(Short Answer)
4.9/5
(29)
Correct Answer:
Permissions
What process, available on most routers, will help improve security by replacing the internal IP address of the transmitting device with a public IP address?
(Multiple Choice)
4.7/5
(35)
You don't need to physically secure your servers as long as you use a good strong password for your accounts.
(True/False)
4.8/5
(29)
A common guideline about network security is that if there's ____________ access to the equipment, there's no security.
(Short Answer)
4.8/5
(31)
Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.
(Essay)
4.8/5
(30)
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-spreads by replicating itself into programs or documents
(Essay)
4.8/5
(31)
Which standard feature on NTFS-formatted disks encrypts individual files and uses a certificate matching the user account of the user who encrypted the file?
(Multiple Choice)
4.9/5
(30)
Which of the following can be used to secure data on disk drives? (Choose all that apply.)
(Multiple Choice)
4.8/5
(43)
What are the complexity requirements for a Windows password? List the four characteristics.
(Essay)
4.8/5
(41)
Which of the following is NOT a guideline of a security policy?
(Multiple Choice)
4.9/5
(38)
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-permits access to computer, bypasses normal authentication
(Essay)
4.7/5
(39)
Which facet of securing access to network data makes data unusable to anyone except authorized users?
(Multiple Choice)
4.9/5
(31)
What type of device should you install as a decoy to lure potential attackers?
(Multiple Choice)
4.7/5
(37)
____________ authentication requires the identities of both parties involved in a communication session to be verified.
(Short Answer)
4.7/5
(35)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)