Exam 1: Network Security Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A packet monkey is an unskilled programmer who spreads viruses and other malicious scripts to exploit computer weaknesses.

(True/False)
4.8/5
(38)

What tool do you use to secure remote access by users who utilize the Internet?

(Multiple Choice)
4.8/5
(36)

Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

(Multiple Choice)
5.0/5
(24)

MATCHING -An access control method that establishes organizational roles to control access to information

(Multiple Choice)
4.9/5
(30)

A ______________ is reserved for a program that runs in the background to listen for requests for the service it offers.

(Short Answer)
4.7/5
(38)

MATCHING -Signs of possible attacks that include an IP address,a port number,and the frequency of access attempts; an IDPS uses signatures to detect possible attacks

(Multiple Choice)
4.9/5
(30)

With discretionary access control,network users can share information with other users,making it more risky than MAC.

(True/False)
4.9/5
(27)

Defense in depth can best be described as which of the following?

(Multiple Choice)
4.9/5
(34)

Compare and contrast virus and worm.

(Essay)
4.8/5
(46)

A hactivist can best be described as which of the following?

(Multiple Choice)
4.9/5
(32)

Which of the following is NOT one of the three primary goals of information security?

(Multiple Choice)
4.7/5
(31)

Physical security protects a system from theft,fire,or environmental disaster.

(True/False)
4.8/5
(38)

Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?

(Multiple Choice)
4.9/5
(33)

What are the three primary goals of information security? Describe them.

(Essay)
4.9/5
(33)

Discuss defense in depth.

(Essay)
4.8/5
(37)

MATCHING -A semitrusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN

(Multiple Choice)
4.8/5
(36)

__________________ are spread by several methods,including running executable code,sharing disks or memory sticks,opening e-mail attachments,and viewing infected or malicious Web pages.

(Short Answer)
5.0/5
(34)

MATCHING -Hardware or software tools that allow or deny packets based on specified criteria,such as port,IP address,or protocol.

(Multiple Choice)
4.8/5
(35)

List and describe two motivations attackers have to attack a network.

(Essay)
4.8/5
(41)

What is a script kiddie?

(Essay)
4.8/5
(46)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)