Exam 10: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the difference between a virus and a worm?

(Essay)
4.8/5
(39)

Which protocol is used to encrypt data as it travels a network?

(Multiple Choice)
4.8/5
(28)

____________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.

(Short Answer)
4.7/5
(30)

Firewall rules can be based on which of the following properties? (Choose all that apply.)

(Multiple Choice)
4.7/5
(36)

You don't need to physically secure your servers as long as you use a good strong password for your accounts.

(True/False)
4.9/5
(34)

When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?

(Multiple Choice)
4.8/5
(25)

A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.

(True/False)
4.9/5
(34)

What are the complexity requirements for a Windows password? List the four characteristics.

(Essay)
4.8/5
(36)

What is a network security policy?

(Essay)
4.8/5
(43)

A(an) ____________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect.

(Short Answer)
4.8/5
(29)

Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.

(Multiple Choice)
4.8/5
(32)

What is a VPN?

(Essay)
4.9/5
(35)

In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.

(True/False)
4.9/5
(36)

If the minimum password length on a Windows system is set to zero, what does that mean?

(Multiple Choice)
5.0/5
(36)

If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?

(Multiple Choice)
4.8/5
(36)

A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.

(True/False)
4.9/5
(37)

Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?

(Multiple Choice)
4.9/5
(32)

What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?

(Multiple Choice)
4.9/5
(40)

Which VPN implementation needs no additional configuration to be allowed access through a firewall?

(Multiple Choice)
4.8/5
(31)

In Windows 7, what is the maximum length that a password can be?

(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)