Exam 14: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A computer program that can infect a computer without the knowledge or permission of the user is a(n)____.

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

D

An effective security policy implements multiple layers of security.

Free
(True/False)
4.7/5
(34)
Correct Answer:
Verified

True

____________________ is the process by which users verify to a server that they are who they say they are.

Free
(Short Answer)
4.8/5
(38)
Correct Answer:
Verified

Authentication

____ is an industry-standard protocol that simply provides authentication service.

(Multiple Choice)
4.7/5
(38)

The ____ protocol is governed by RFC 2865 and can be used with cross-platform integration.

(Multiple Choice)
4.9/5
(34)

____ is a suite of protocols, accepted as an industry standard, which provides secure data transmission over layer 3 of the OSI model.

(Multiple Choice)
4.8/5
(32)

Briefly explain encryption at the network level.

(Essay)
4.8/5
(29)

A ____ virus is so named because it attempts to hide itself from detection.

(Multiple Choice)
4.7/5
(37)

What are the goals of a security policy?

(Essay)
4.8/5
(39)

____________________ refers to malicious programs that have many different capabilities. Some might do something relatively harmless, such as opening files on a CD-ROM; others might be extremely destructive, perhaps destroying all of the data on a computer.

(Short Answer)
4.9/5
(38)

The ____ is the least protective of the four firewall topologies.

(Multiple Choice)
4.8/5
(24)

Why is it important to have a patch management program?

(Essay)
4.8/5
(40)

Briefly describe a Virtual Private Network (VPN)?

(Essay)
4.8/5
(40)

____ is a means of encrypting a session between two hosts through the use of digital certificates, which are based on asymmetric key encryption.

(Multiple Choice)
4.9/5
(27)

Describe the two IPSec protocols that have been developed to provide packet-level security.

(Essay)
4.8/5
(34)

When a user opens an infected application file or document, a(n) ____ attaches itself to the application and infects other files accessed by the same application.

(Multiple Choice)
5.0/5
(35)

The ____ firewall topology consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host.

(Multiple Choice)
4.8/5
(36)

In network security, a(n) ____________________ is an official approval that allows a user to access a specific network resource.

(Short Answer)
4.8/5
(30)

Briefly explain how to protect an organization's hardware.

(Essay)
4.7/5
(32)

A ____ VPN allows designated users to have access to the corporate network from remote locations.

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)