Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -A firewall that can block designated types of traffic based on application data contained within packets.

Free
(Short Answer)
4.9/5
(26)
Correct Answer:
Verified

C

Encryption is the last means of defense against data theft.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

Describe an advantage of using EAP.

Free
(Essay)
5.0/5
(34)
Correct Answer:
Verified

One of EAP's advantages is its flexibility.It is supported by nearly all modern operating systems and can be used with any authentication method.For example,although the typical network authentication involves a user ID and password,EAP also works with biorecognition methods,such as retina or hand scanning.EAP is also adaptable to new technology.Therefore,no matter what future wireless encryption schemes are developed,EAP will support them.

A ____ firewall is a router (or a computer installed with software that enables it to act as a router)that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

(Multiple Choice)
4.9/5
(27)

A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.

(Multiple Choice)
5.0/5
(34)

____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.

(Short Answer)
4.8/5
(29)

Describe the two phases IPSec use to accomplish authentication.

(Essay)
4.8/5
(43)

A(n)____________________ identifies an organization's security risks,levels of authority,designated security coordinator and team members,responsibilities for each team member,and responsibilities for each employee.

(Short Answer)
4.8/5
(29)

MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -A software application on a network host that acts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic.

(Short Answer)
4.8/5
(28)

By default,the 802.11 standard offers substantial security.

(True/False)
4.8/5
(38)

A(n)____ is a password-protected and encrypted file that holds an individual's identification information,including a public key.

(Multiple Choice)
4.8/5
(37)

MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -A firewall that protects only the computer on which it is installed.

(Short Answer)
4.8/5
(40)

Human errors,ignorance,and omissions cause more than half of all security breaches sustained by networks.

(True/False)
4.9/5
(27)

____ protocols are the rules that computers follow to accomplish authentication.

(Multiple Choice)
4.8/5
(32)

Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.

(Essay)
4.9/5
(30)

Describe who should conduct a security audit and advantages,if any.

(Essay)
4.9/5
(39)

____ is a method of encrypting TCP/IP transmissions.

(Multiple Choice)
4.8/5
(27)

In general,information is ____________________ if it could be used by other parties to impair an organization's functioning,decrease customers' confidence,cause a financial loss,damage an organization's status,or give a significant advantage to a competitor.

(Short Answer)
4.9/5
(29)

RADIUS and TACACS belong to a category of protocols known as AAA (____).

(Multiple Choice)
4.8/5
(34)

Network security is more often compromised "from the inside" than from external sources.

(True/False)
4.9/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)