Exam 10: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ is similar to a virus in that it's self-replicating, but it doesn't attach itself to another program; rather, it's a self-contained program.

(Multiple Choice)
4.8/5
(26)

Firewalls can attempt to determine the context of a packet; this process is called ______________________________ (SPI).

(Short Answer)
4.9/5
(34)

WEP, the successor to WPA, has enhancements that make it much more difficult to crack the encryption code.

(True/False)
4.8/5
(38)

A VPN is limited to dial-up connections.

(True/False)
4.8/5
(29)

A ____ is a program that spreads by replicating itself into other programs or documents.

(Multiple Choice)
4.8/5
(31)

What are the basic guidelines that a network security policy should follow?

(Essay)
4.8/5
(37)

____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.

(Multiple Choice)
4.8/5
(38)

____ monitors or in some way controls part of your computer at the expense of your privacy and to the gain of some third party.

(Multiple Choice)
4.8/5
(41)

How can you use NAT to improve security?

(Essay)
4.9/5
(43)

Windows OSs ____ permissions are applied to folders (and only folders)shared over the network.

(Multiple Choice)
4.8/5
(32)

Attackers who drive around looking for wireless LANs to intercept are called ____.

(Multiple Choice)
4.8/5
(35)

A(n)____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.

(Multiple Choice)
4.8/5
(34)

A ____ program appears to be something useful, such as a free utility, but in reality contains some type of malware.

(Multiple Choice)
4.9/5
(35)

A(n)____________________ address is a source address inserted into the packet that isn't the actual address of the sending station.

(Short Answer)
4.8/5
(33)

An intrusion detection system (IDS)usually works with a firewall or router with access control lists.

(True/False)
4.8/5
(31)

The most popular method for encrypting data as it travels network media is to use an extension to the IP protocol called ____.

(Multiple Choice)
4.9/5
(32)

Can you use a firewall as a router? Explain.

(Essay)
5.0/5
(37)

IPSec is an excellent way to secure data as it travels across a network, and to secure data on disk drives to block someone from gaining unauthorized access to the computer.

(True/False)
4.8/5
(35)

What is a highly restrictive security policy?

(Essay)
5.0/5
(35)

Describe some of the physical security best practices.

(Essay)
4.9/5
(33)
Showing 21 - 40 of 48
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)