Exam 12: Network Security
Exam 1: An Introduction to Networking50 Questions
Exam 2: Network Standards and the OSI Model50 Questions
Exam 3: Transmission Basics and Networking Media50 Questions
Exam 4: Introduction to TCP/IP Protocols50 Questions
Exam 5: Topologies and Ethernet Standards48 Questions
Exam 6: Network Hardware50 Questions
Exam 7: WANs and Remote Connectivity50 Questions
Exam 8: Wireless Networking50 Questions
Exam 9: Network Operating Systems50 Questions
Exam 10: In-Depth TCP/IP Networking50 Questions
Exam 11: Voice and Video Over IP50 Questions
Exam 12: Network Security50 Questions
Exam 13: Troubleshooting Network Problems50 Questions
Exam 14: Ensuring Integrity and Availability50 Questions
Exam 15: Network Management50 Questions
Select questions type
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-A firewall that can block designated types of traffic based on application data contained within packets.
Free
(Short Answer)
4.9/5
(26)
Correct Answer:
C
Encryption is the last means of defense against data theft.
Free
(True/False)
4.9/5
(32)
Correct Answer:
True
Describe an advantage of using EAP.
Free
(Essay)
5.0/5
(34)
Correct Answer:
One of EAP's advantages is its flexibility.It is supported by nearly all modern operating systems and can be used with any authentication method.For example,although the typical network authentication involves a user ID and password,EAP also works with biorecognition methods,such as retina or hand scanning.EAP is also adaptable to new technology.Therefore,no matter what future wireless encryption schemes are developed,EAP will support them.
A ____ firewall is a router (or a computer installed with software that enables it to act as a router)that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
(Multiple Choice)
4.9/5
(27)
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
(Multiple Choice)
5.0/5
(34)
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
(Short Answer)
4.8/5
(29)
A(n)____________________ identifies an organization's security risks,levels of authority,designated security coordinator and team members,responsibilities for each team member,and responsibilities for each employee.
(Short Answer)
4.8/5
(29)
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-A software application on a network host that acts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic.
(Short Answer)
4.8/5
(28)
A(n)____ is a password-protected and encrypted file that holds an individual's identification information,including a public key.
(Multiple Choice)
4.8/5
(37)
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-A firewall that protects only the computer on which it is installed.
(Short Answer)
4.8/5
(40)
Human errors,ignorance,and omissions cause more than half of all security breaches sustained by networks.
(True/False)
4.9/5
(27)
____ protocols are the rules that computers follow to accomplish authentication.
(Multiple Choice)
4.8/5
(32)
Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.
(Essay)
4.9/5
(30)
In general,information is ____________________ if it could be used by other parties to impair an organization's functioning,decrease customers' confidence,cause a financial loss,damage an organization's status,or give a significant advantage to a competitor.
(Short Answer)
4.9/5
(29)
RADIUS and TACACS belong to a category of protocols known as AAA (____).
(Multiple Choice)
4.8/5
(34)
Network security is more often compromised "from the inside" than from external sources.
(True/False)
4.9/5
(32)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)