Exam 9: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.

(Multiple Choice)
4.9/5
(36)

If the minimum password length on a Windows system is set to zero, what does that mean?

(Multiple Choice)
4.8/5
(29)

What is the difference between an IDS and IPS?

(Essay)
4.9/5
(30)

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity

(Essay)
4.9/5
(37)

A security policy should clearly state the desired rules, even if they cannot be enforced.

(True/False)
4.9/5
(29)

Which protocol works by establishing an association between two communicating devices and can use a preshared key for authentication?

(Multiple Choice)
4.7/5
(31)

Why is it important that a network is physically secured?

(Essay)
4.9/5
(28)

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -monopolizes network services or network bandwidth

(Essay)
4.8/5
(37)

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -malware that's activated when a particular event occurs

(Essay)
4.9/5
(19)

What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?

(Multiple Choice)
4.9/5
(26)

What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?

(Multiple Choice)
4.9/5
(30)

A rootkit is a self-replicating program that masks itself as a useful program but is actually a type of malware.

(True/False)
4.8/5
(31)

A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.

(True/False)
4.7/5
(38)

Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)

(Multiple Choice)
4.8/5
(29)

What type of policy defines the methods involved when a user sign in to the network?

(Multiple Choice)
4.9/5
(39)

Which VPN implementation typically needs no additional firewall configuration to be allowed access through the firewall?

(Multiple Choice)
4.7/5
(43)

How the network resources are to be used should be clearly defined in a (an) ____________ policy.

(Short Answer)
4.7/5
(32)

Which of the following are true about WPA3? (Choose all that apply.)

(Multiple Choice)
4.8/5
(43)

Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?

(Multiple Choice)
4.9/5
(38)

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -packets are denied on context as well as packet properties

(Essay)
4.9/5
(33)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)