Exam 11: Securing Your Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is unrequested e-mail that is sent to hundreds, thousands, or even millions of users.

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

C

If you want to block access to Telnet using a firewall, then consider blocking TCP/UDP port ____.

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

B

Provide a description of service packs.

Free
(Essay)
4.9/5
(37)
Correct Answer:
Verified

Service packs are designed to address security issues as well as problems affecting stability, performance, or the operation of features included with the operating system.
Service packs come out less frequently than the patches you obtain from Windows Update, but they generally include, in one place, patches that can be obtained from Windows Update, major fixes, new operating system features, and any previous service packs.

The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.

(Multiple Choice)
4.8/5
(32)

Application level gateways are restricted to a single level of filtering.

(True/False)
4.8/5
(37)

Identify five Microsoft Routing and Remote Access Services that enable or manage remote access to Windows Server 2003.

(Essay)
4.9/5
(32)

____ goes to the source of the TCP/IP communications by securing IP in its Network layer, or Layer 3.

(Multiple Choice)
4.8/5
(30)

____ can translate an IP address from a private network to a different address used on a public network or the Internet.

(Multiple Choice)
4.8/5
(36)

What are the main elements involved in a wireless network attack?

(Essay)
4.8/5
(29)

____________________ involves taking specific actions to block or prevent attacks by means of operating system and network security methods.

(Short Answer)
4.7/5
(42)

In ____ routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.

(Multiple Choice)
4.8/5
(40)

Virtual private networks (VPNs)can be set up to provide secure remote communications.

(True/False)
4.9/5
(34)

The Trojan horse named ____ is designed to give the attacker the target's user account and password.

(Multiple Choice)
4.8/5
(35)

Identify five border points that the strongest border security is designed to protect.

(Essay)
4.8/5
(32)

On the sending computer using IPSec, the data is encrypted at the ____ layer.

(Multiple Choice)
4.9/5
(24)
Match each term with the correct statement below.
command line interface that enables you to configure packet filter rules through the use of tables.
IPTables
might take the form of simply flooding a system with more packets than it can handle.
digital certificate
used between network computers to verify the authenticity of the communication.
National Security Institute (NSI)
Correct Answer:
Verified
Premises:
Responses:
command line interface that enables you to configure packet filter rules through the use of tables.
IPTables
might take the form of simply flooding a system with more packets than it can handle.
digital certificate
used between network computers to verify the authenticity of the communication.
National Security Institute (NSI)
tool that may be used to designate a trusted device.
worm
used by attackers to associate IP address information with account and password communications.
sniffer software
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
remote denial of service (DoS)attack
a list of permit and deny conditions that can be associated with a particular router interface.
Security Level Configuration
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
spyware
provides information about all kinds of security threats.
access control list (ACL)
(Matching)
4.8/5
(32)

Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer, such as a Web server.

(Multiple Choice)
4.8/5
(33)

On a UNIX/Linux system, IPSec can be configured using the ____ function with the spdadd instruction in a shell script.

(Multiple Choice)
4.7/5
(32)

You can configure Windows Firewall for any network connection.

(True/False)
4.9/5
(30)

How does a buffer attack work?

(Essay)
4.8/5
(34)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)