Exam 11: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A NOS that contains a "back door"is an example of a risk associated with ____.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

Network security is more often compromised "from the inside" than from external sources.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

True

Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.

(Short Answer)
4.8/5
(26)

Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.

(Essay)
4.9/5
(38)

Describe an advantage of using EAP.

(Essay)
4.9/5
(32)

Describe the two phases IPSec use to accomplish authentication.

(Essay)
4.9/5
(25)

Describe what distinguishes 802.1x from other authentication standards.

(Essay)
4.9/5
(36)

The combination of a public key and a private key is known as a ____.

(Multiple Choice)
4.8/5
(31)

Define SSH (secure shell) and explain the threats it guards against. Include an explanation of the encryption algorithms that may be used with it.

(Essay)
4.9/5
(38)
Match each item with a statement below:
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Stateful
Data is encrypted using a single key.
HIDS
Software that can only detect and log suspicious activity.
proxy server
Correct Answer:
Verified
Premises:
Responses:
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Stateful
Data is encrypted using a single key.
HIDS
Software that can only detect and log suspicious activity.
proxy server
A firewall that protects only the computer on which it is installed.
IPS
The host that runs the proxy service.
public key encryption
A firewall that can block designated types of traffic based on application data contained within packets.
private key encryption
Data is encrypted using two keys.
IDS
Software that can react to suspicious activity.
content filtering
A firewall that can view a data stream.
proxy service
(Matching)
4.8/5
(51)

Describe one potential flaw in CHAP and MS-CHAP authentication and explain how it is resolved.

(Essay)
4.9/5
(35)

In ____, a hacker forges name server records to falsify his host's identity.

(Multiple Choice)
4.8/5
(31)

Describe the three-way handshake used in CHAP.

(Essay)
4.8/5
(34)

____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.

(Short Answer)
4.7/5
(35)

____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

(Multiple Choice)
4.8/5
(45)

A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.

(Multiple Choice)
4.9/5
(26)

In general, information is ____________________ if it could be used by other parties to impair an organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor.

(Short Answer)
5.0/5
(37)

Define and describe PAP.

(Essay)
4.9/5
(35)

A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

(Short Answer)
4.9/5
(32)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)