Exam 10: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)____ attack is an attacker's attempt to tie up network bandwidth or network services so that it renders those resources useless to legitimate users.

Free
(Multiple Choice)
5.0/5
(42)
Correct Answer:
Verified

D

What are the benefits of using VPNs?

Free
(Essay)
4.9/5
(44)
Correct Answer:
Verified

VPNs enable organizations to use the Internet as a private dial-up or broadband service for users with machines running a VPN-supported OS. Organizations can also interconnect multiple LANs across the Internet-one pair of networks at a time. Using VPNs to connect users to a company network has clear advantages:
- Installing several modems on an RRAS server so that users can dial up the server directly isn't necessary; instead, users can dial up any ISP. As long as the VPN server has an Internet connection, a private connection can be established. This method saves money on hardware and systems management.
- Remote users can usually access an RRAS server by making only a local phone call, no matter where they might be, as long as they can access a local ISP. Distance from the RRAS server no longer matters; this feature saves money on long-distance telephone charges.
- When broadband connectivity to the Internet is available, such as DSL or cable modem,remote users can connect to the corporate network at high speed, making remote computing sessions more productive than dial-up connections.

Encryption prevents somebody using eavesdropping technology, such as a(n)____, from capturing packets and using data in the packets for malicious purposes.

Free
(Multiple Choice)
5.0/5
(36)
Correct Answer:
Verified

D

With ____, a user running a Windows OS can dial up a Windows server when it's running Routing and Remote Access Service (RRAS).

(Multiple Choice)
4.8/5
(44)

What is the 802.11i standard?

(Essay)
4.8/5
(33)

Spam is simply unsolicited e-mail.

(True/False)
4.8/5
(30)

On Linux systems, a simple method to encrypt files involves using a command-line program called ____.

(Multiple Choice)
5.0/5
(41)

What are the rules or guidelines for creating secure passwords?

(Essay)
4.9/5
(37)

IPSec works by establishing a(n)____ between two communicating devices.

(Multiple Choice)
4.8/5
(32)
Match each term with the correct statement below.
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
protocol analyzer
term used sometimes by white hats for their consulting services
hacker
handy utility for discovering information about an Internet domain
port scanner
Correct Answer:
Verified
Premises:
Responses:
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
protocol analyzer
term used sometimes by white hats for their consulting services
hacker
handy utility for discovering information about an Internet domain
port scanner
security feature used on some wireless access points
MAC filtering
automated method for pinging a range of IP addresses
encryption
determines which TCP and UDP ports are available on a particular computer or device
cracker
allows you to capture packets and determine which protocols services are running
penetration tester
sometimes a derogatory term to describe an unskilled or undisciplined programmer
ping scanner
used to safeguard data as it travels across the Internet and even within the company network
Whois
(Matching)
4.9/5
(43)

____ allows administrators to control what users can do after they are logged on to the network.

(Multiple Choice)
4.8/5
(36)

A ____ is a program installed on a computer that permits access to the computer, bypassing the normal authentication process.

(Multiple Choice)
4.9/5
(31)

What is a hoax virus?

(Essay)
4.9/5
(37)

A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.

(True/False)
4.8/5
(41)

Viruses, worms, and rootkits are part of a broader category of software called ____________________, which is any software designed to cause harm or disruption to a computer system or perform activities on a computer without the consent of the computer's owner.

(Short Answer)
4.9/5
(44)

____ are a form of Trojan programs that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords.

(Multiple Choice)
5.0/5
(37)

In Windows XP, Vista, and Server 2003, _________________________ (EFS)is a standard feature available on NTFS-formatted disks.

(Short Answer)
4.8/5
(35)

On Linux systems, the passwords can be stored in an encrypted format in the ____ file located in the /etc directory.

(Multiple Choice)
4.8/5
(31)

____ is the standard software service on many Linux distributions for authenticating users.

(Multiple Choice)
4.8/5
(34)

What are the elements of a security policy? Briefly describe each.

(Essay)
4.8/5
(32)
Showing 1 - 20 of 48
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)