Exam 11: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.

(Multiple Choice)
4.9/5
(38)

A n) ______ is a special type of virus that spreads itself without human intervention.

(Multiple Choice)
4.9/5
(28)

The use of hacking techniques to bring attention to a larger political or social goal is referred to as

(Multiple Choice)
4.8/5
(40)

A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.

(True/False)
4.8/5
(35)

Fault-intolerant servers contain many redundant components to prevent failure.

(True/False)
4.9/5
(34)

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall

(True/False)
4.9/5
(38)

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?

(Multiple Choice)
4.8/5
(31)

Which of the following is a mode that is used by IPSec?

(Multiple Choice)
4.8/5
(38)

The key principle in preventing disruption, destruction and disaster is ___________.

(Multiple Choice)
4.9/5
(36)

________ controls fix a trespass into the network.

(Multiple Choice)
4.9/5
(39)

How does a network manager utilize a user profile?

(Short Answer)
4.8/5
(33)

Social engineering refers to creating a team that solves virus problems.

(True/False)
5.0/5
(45)

A Trojan horse allows a user to access a computer from a remote location.

(True/False)
4.8/5
(39)

What is IP spoofing?

(Essay)
4.8/5
(34)

A network switch failure is an example of an) ________ threat.

(Multiple Choice)
4.8/5
(37)

Describe the four risk control strategies and when you might use each one.

(Essay)
4.9/5
(45)

An uninterruptible power supply utilizes a second redundant disk for every disk on the server.

(True/False)
4.7/5
(37)

List three risk assessment frameworks that are commonly used.

(Short Answer)
4.9/5
(33)

Microsoft's Windows operating system meets A1 level security.

(True/False)
4.8/5
(36)

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 127
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)