Exam 9: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority

Free
(Essay)
4.8/5
(41)
Correct Answer:
Verified

a

A honeypot is configured to entice attackers and allows administrators to get information about the attack techniques being used.

Free
(True/False)
4.8/5
(41)
Correct Answer:
Verified

True

____________ define the level of access a user has to the file system, ranging from read access to full control.

Free
(Short Answer)
4.9/5
(29)
Correct Answer:
Verified

Permissions

What is the difference between a virus and a worm?

(Essay)
4.9/5
(32)

What process, available on most routers, will help improve security by replacing the internal IP address of the transmitting device with a public IP address?

(Multiple Choice)
4.7/5
(35)

You don't need to physically secure your servers as long as you use a good strong password for your accounts.

(True/False)
4.8/5
(29)

A common guideline about network security is that if there's ____________ access to the equipment, there's no security.

(Short Answer)
4.8/5
(31)

Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.

(Essay)
4.8/5
(30)

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -spreads by replicating itself into programs or documents

(Essay)
4.8/5
(31)

Which standard feature on NTFS-formatted disks encrypts individual files and uses a certificate matching the user account of the user who encrypted the file?

(Multiple Choice)
4.9/5
(30)

How should a room that is going to house your servers be equipped?

(Essay)
4.8/5
(37)

Which of the following can be used to secure data on disk drives? (Choose all that apply.)

(Multiple Choice)
4.8/5
(43)

What are the complexity requirements for a Windows password? List the four characteristics.

(Essay)
4.8/5
(41)

Which of the following is NOT a guideline of a security policy?

(Multiple Choice)
4.9/5
(38)

What is a network security policy?

(Essay)
4.8/5
(38)

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -permits access to computer, bypasses normal authentication

(Essay)
4.7/5
(39)

Which facet of securing access to network data makes data unusable to anyone except authorized users?

(Multiple Choice)
4.9/5
(31)

How will advances in biometric authentication affect security?

(Essay)
4.8/5
(26)

What type of device should you install as a decoy to lure potential attackers?

(Multiple Choice)
4.7/5
(37)

____________ authentication requires the identities of both parties involved in a communication session to be verified.

(Short Answer)
4.7/5
(35)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)