Exam 11: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Triple DES uses a total of 512 bits as the key.

Free
(True/False)
4.8/5
(42)
Correct Answer:
Verified

False

Macro viruses can spread when an infected file is opened.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

A fundamental technique to determine if an intrusion is in progress in a stable network is:

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

A

A security hole is an):

(Multiple Choice)
4.9/5
(35)

A patch is a software solution to correct a security hole

(True/False)
4.9/5
(50)

Using a chart format, describe 8 possible threats to a data network such as hardware, software, files, circuits, internal personnel, physical security, external people, and users).Describe 8 possible solutions to these conceivable threats.

(Essay)
4.8/5
(37)

Describe the three main reasons why there has been an increase in computer security over the past few years.

(Essay)
4.9/5
(41)

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they

(Multiple Choice)
4.8/5
(30)

_________ controls stop a person from acting.

(Multiple Choice)
4.9/5
(43)

For Ethernet networks, a _______ switch can make eavesdropping more difficult.

(Multiple Choice)
4.8/5
(32)

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as:

(Multiple Choice)
4.9/5
(36)

Describe five biometric technologies.How can a biometric enhance security in a network? What are some of the advantages and disadvantages of biometrics?

(Essay)
4.8/5
(32)

An example of _____ of data would be if a computer virus eliminated files on that computer.

(Multiple Choice)
4.8/5
(35)

What is the difference between a network-based IPS, host-based IPS and application-based IPS?

(Essay)
4.9/5
(41)

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.

(True/False)
4.9/5
(30)

A tornado that eliminates a network control center would be an example of a natural __________

(Multiple Choice)
4.8/5
(45)

The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.

(True/False)
4.9/5
(40)

Researchers estimate that only one or two new viruses are developed every week.

(True/False)
4.9/5
(34)

A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000.

(True/False)
4.8/5
(37)

Describe how asymmetric encryption works, using a chart to help to explain this approach.

(Essay)
4.9/5
(34)
Showing 1 - 20 of 127
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)