Exam 10: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

What is a penetration tester?

Free
(Essay)
4.7/5
(37)
Correct Answer:
Verified

A penetration tester is a person who is skilled in the art of breaking into a network to find where the network is vulnerable for the purposes of advising a company on how to be more secure.

Briefly describe the three levels of network security policies.

(Essay)
4.7/5
(36)

MATCHING: MATCHING:

(Essay)
4.9/5
(38)

A firewall can be implemented in two different ways. What are they?

(Essay)
4.9/5
(44)

What is a policy that defines the methods involved when a user logs on to the network called?

(Multiple Choice)
4.8/5
(36)

____________ is a free open-source product that can be used to encrypt the contents of an entire drive.

(Short Answer)
4.9/5
(29)

Which of the following should not be a concern when discerning the level of security that is required in a network?

(Multiple Choice)
4.8/5
(33)

How the network resources are to be used should be clearly defined in a (an) ____________ policy.

(Short Answer)
4.8/5
(38)

Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.

(Essay)
4.7/5
(33)

What is an IDS?

(Essay)
4.8/5
(32)

Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

(Multiple Choice)
4.9/5
(31)

Which of the following can be used to secure data on disk drives? (Choose all that apply.)

(Multiple Choice)
4.9/5
(25)

In Linux, passwords are stored in an encrypted format in the ____________ file, which is located in the /etc directory.

(Short Answer)
4.7/5
(38)

How should a room that is going to house your servers be equipped?

(Essay)
4.8/5
(31)

The ultimate goal of network security is to protect which of the following?

(Multiple Choice)
4.9/5
(39)

Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?

(Multiple Choice)
4.8/5
(31)

The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?

(Multiple Choice)
4.7/5
(44)

A security policy should clearly state the desired rules, even if they cannot be enforced..

(True/False)
4.9/5
(22)
Showing 1 - 20 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)