Exam 11: Securing Your Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which technology discourages attackers because they cannot identify a specific computer to attack on the internal network?

Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
Verified

B

Which of the following is a program that appears useful,but instead does harm to a user's computer?

Free
(Multiple Choice)
5.0/5
(45)
Correct Answer:
Verified

C

The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

C

Compare and contrast stateful versus stateless packet filtering

(Essay)
4.8/5
(36)

Describe a man-in-the-middle attack.

(Essay)
4.7/5
(34)

Which of the following are criteria upon which a router can make filtering decisions? (Choose all that apply.)

(Multiple Choice)
4.8/5
(34)

One step in hardening a system involves deploying all available services on your system,thereby confusing a potential attacker.

(True/False)
4.9/5
(40)

____ is unrequested e-mail that is sent to hundreds,thousands,or even millions of users.

(Multiple Choice)
4.8/5
(36)

Match each term with the correct statement below. -command line interface that enables you to configure packet filter rules through the use of tables.

(Multiple Choice)
4.9/5
(43)

Which of the following are steps to keep in mind when hardening a system? (Choose all that apply.)

(Multiple Choice)
4.9/5
(33)

Stateless filtering screens on the basis of the context of the communication.

(True/False)
4.8/5
(34)

Which of the following is a portion of a network that exists between two or more networks such as a network between a private network and the Internet?

(Multiple Choice)
4.8/5
(33)

A router can perform packet filtering and can be used as a firewall on a network.

(True/False)
4.8/5
(32)

Briefly describe network address translation.

(Essay)
4.8/5
(38)

Match each term with the correct statement below. -provides information about all kinds of security threats.

(Multiple Choice)
4.8/5
(31)

A ____________________ is not a virus,but an e-mail falsely warning of a virus.

(Short Answer)
4.7/5
(46)

It is best to secure your wireless network in order to prevent which of the following types of attacks that involve the attacker using a portable computer and an omnidirectional antenna?

(Multiple Choice)
4.9/5
(44)

Which of the following are border points that should be protected with a strong border security design? (Choose all that apply.)

(Multiple Choice)
4.8/5
(33)

Match each term with the correct statement below. -might take the form of simply flooding a system with more packets than it can handle.

(Multiple Choice)
5.0/5
(38)

Match each term with the correct statement below. -used by attackers to associate IP address information with account and password communications.

(Multiple Choice)
5.0/5
(35)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)