Exam 11: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages.

(True/False)
4.9/5
(33)

_______________ describes how an asset can be compromised by one specific threat.

(Multiple Choice)
4.8/5
(43)

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.

(True/False)
4.9/5
(38)

Some people think that CERT's posting of security alerts causes more break ins than it prevents.What are the pros and cons of this argument? Do you think CERT should continue to post security holes?

(Essay)
4.8/5
(36)

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.

(Multiple Choice)
4.9/5
(41)

An) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.

(Multiple Choice)
4.7/5
(38)

We can calculate the relative ___________, by multiplying the impact score by the likelihood.

(Multiple Choice)
4.7/5
(29)

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.

(True/False)
4.7/5
(38)

Which of the following is not a method for deterring intrusion?

(Multiple Choice)
4.7/5
(46)

The most common access point used by attackers to gain access to an organization's network is the dial-up access via a modem.

(True/False)
4.7/5
(34)

Controls are mechanisms that reduce or eliminate threats to network security.

(True/False)
4.8/5
(41)

What are the most important servers to protect on a network and why?

(Short Answer)
4.9/5
(33)

The most common authentication protocol used today is Kerberos.

(True/False)
4.8/5
(34)

Preventive controls mitigate or stop a person from acting or an event from occurring.

(True/False)
4.7/5
(39)

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.

(True/False)
4.9/5
(37)

An) ____________, is an information system that is critical to the survival of an organization.

(Multiple Choice)
4.8/5
(38)

Developing _______ helps develop a secure network.

(Multiple Choice)
4.7/5
(37)

Encryption is the process of:

(Multiple Choice)
4.8/5
(24)

An) _________ is something of value and can be either hardware or software.

(Multiple Choice)
4.9/5
(40)

A way to prevent intrusion by disguising information through algorithms is:

(Multiple Choice)
4.9/5
(46)
Showing 61 - 80 of 127
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)