Exam 9: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -a self-contained, self-replicating program

(Essay)
4.9/5
(42)

Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

(Multiple Choice)
4.8/5
(33)

What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?

(Multiple Choice)
4.9/5
(34)

Someone who wants to send encrypted data must acquire a digital certificate from a ____________ authority.

(Short Answer)
4.8/5
(31)

You have been asked to determine what services are accessible on your network so you can close those that are not necessary. What tool should you use?

(Multiple Choice)
4.9/5
(37)

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -used to discover breaches in security

(Essay)
4.9/5
(28)

Which Windows domain-based protocol provides mutual authentication between devices?

(Multiple Choice)
4.9/5
(36)

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -inspects packets as they go into and out of the network

(Essay)
4.8/5
(34)

You have purchased a network-based IDS. You have been tasked with deploying the device in a location where the entire network can be protected. Where should you deploy it?

(Multiple Choice)
4.8/5
(35)

What is a penetration tester?

(Essay)
4.9/5
(41)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)