Exam 10: Introduction to Network Security
A(n)____ attack is an attacker's attempt to tie up network bandwidth or network services so that it renders those resources useless to legitimate users.
D
What are the benefits of using VPNs?
VPNs enable organizations to use the Internet as a private dial-up or broadband service for users with machines running a VPN-supported OS. Organizations can also interconnect multiple LANs across the Internet-one pair of networks at a time. Using VPNs to connect users to a company network has clear advantages:
- Installing several modems on an RRAS server so that users can dial up the server directly isn't necessary; instead, users can dial up any ISP. As long as the VPN server has an Internet connection, a private connection can be established. This method saves money on hardware and systems management.
- Remote users can usually access an RRAS server by making only a local phone call, no matter where they might be, as long as they can access a local ISP. Distance from the RRAS server no longer matters; this feature saves money on long-distance telephone charges.
- When broadband connectivity to the Internet is available, such as DSL or cable modem,remote users can connect to the corporate network at high speed, making remote computing sessions more productive than dial-up connections.
Encryption prevents somebody using eavesdropping technology, such as a(n)____, from capturing packets and using data in the packets for malicious purposes.
D
With ____, a user running a Windows OS can dial up a Windows server when it's running Routing and Remote Access Service (RRAS).
On Linux systems, a simple method to encrypt files involves using a command-line program called ____.
IPSec works by establishing a(n)____ between two communicating devices.
____ allows administrators to control what users can do after they are logged on to the network.
A ____ is a program installed on a computer that permits access to the computer, bypassing the normal authentication process.
A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.
Viruses, worms, and rootkits are part of a broader category of software called ____________________, which is any software designed to cause harm or disruption to a computer system or perform activities on a computer without the consent of the computer's owner.
____ are a form of Trojan programs that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords.
In Windows XP, Vista, and Server 2003, _________________________ (EFS)is a standard feature available on NTFS-formatted disks.
On Linux systems, the passwords can be stored in an encrypted format in the ____ file located in the /etc directory.
____ is the standard software service on many Linux distributions for authenticating users.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)