Exam 1: Network Security Fundamentals
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
A packet monkey is an unskilled programmer who spreads viruses and other malicious scripts to exploit computer weaknesses.
(True/False)
4.8/5
(38)
What tool do you use to secure remote access by users who utilize the Internet?
(Multiple Choice)
4.8/5
(36)
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
(Multiple Choice)
5.0/5
(24)
MATCHING
-An access control method that establishes organizational roles to control access to information
(Multiple Choice)
4.9/5
(30)
A ______________ is reserved for a program that runs in the background to listen for requests for the service it offers.
(Short Answer)
4.7/5
(38)
MATCHING
-Signs of possible attacks that include an IP address,a port number,and the frequency of access attempts; an IDPS uses signatures to detect possible attacks
(Multiple Choice)
4.9/5
(30)
With discretionary access control,network users can share information with other users,making it more risky than MAC.
(True/False)
4.9/5
(27)
Defense in depth can best be described as which of the following?
(Multiple Choice)
4.9/5
(34)
A hactivist can best be described as which of the following?
(Multiple Choice)
4.9/5
(32)
Which of the following is NOT one of the three primary goals of information security?
(Multiple Choice)
4.7/5
(31)
Physical security protects a system from theft,fire,or environmental disaster.
(True/False)
4.8/5
(38)
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?
(Multiple Choice)
4.9/5
(33)
What are the three primary goals of information security? Describe them.
(Essay)
4.9/5
(33)
MATCHING
-A semitrusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN
(Multiple Choice)
4.8/5
(36)
__________________ are spread by several methods,including running executable code,sharing disks or memory sticks,opening e-mail attachments,and viewing infected or malicious Web pages.
(Short Answer)
5.0/5
(34)
MATCHING
-Hardware or software tools that allow or deny packets based on specified criteria,such as port,IP address,or protocol.
(Multiple Choice)
4.8/5
(35)
List and describe two motivations attackers have to attack a network.
(Essay)
4.8/5
(41)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)