Exam 11: Securing Your Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of attack refers to the use of human interaction to gain access to a system or to do damage.

(Multiple Choice)
4.9/5
(29)

A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.

(True/False)
4.9/5
(33)

Identify four network hardening techniques.

(Essay)
4.9/5
(37)

Match each term with the correct statement below. -software that reports back information-to an attacker or an advertiser,for example-about that computer user's activities.

(Multiple Choice)
5.0/5
(36)

A proxy can enhance performance through caching and filter communications.

(True/False)
4.9/5
(34)

Which of the following is used to interfere with normal access to network resources by flooding a network with useless information?

(Multiple Choice)
4.9/5
(31)

A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.

(Multiple Choice)
4.8/5
(32)

Identify four tasks that can be fulfilled by a proxy server.

(Essay)
4.9/5
(36)

A(n)____ is information that a Web server stores on a client computer,such as the client's preferences when accessing a particular Web site,or where the client has been on the Web site.

(Multiple Choice)
4.9/5
(36)

A DoS attack that floods a host with packets from many bogus source addresses is a form of ____________________.

(Short Answer)
4.7/5
(38)

Match each term with the correct statement below. -used between network computers to verify the authenticity of the communication.

(Multiple Choice)
4.8/5
(35)

A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.

(Short Answer)
4.8/5
(40)

Provide a general description for how routers are used in border security.

(Essay)
4.8/5
(31)

Match each term with the correct statement below. -a portion of a network that exists between two or more networks that have different security measures in place

(Multiple Choice)
4.8/5
(30)

How does a buffer attack work?

(Essay)
4.9/5
(34)

What are the advantages of using Network Address Translation (NAT)?

(Essay)
4.7/5
(39)

Which protocol secures IP at the Network layer by using secure communications and encryptions standards?

(Multiple Choice)
4.8/5
(31)

Identify five border points that the strongest border security is designed to protect.

(Essay)
4.8/5
(35)

A set of filtering rules,called a ____,is applied to packets through the use of IPTables.

(Multiple Choice)
4.8/5
(39)

A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system,but does not create new files.

(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)