Deck 1: Introduction to Network Security

Full screen (f)
exit full mode
Question
Which approach to security is proactive in addressing potential threats before they occur?

A)Passive security approach
B)Layered security approach
C)Dynamic security approach
D)Hybrid security approach
Use Space or
up arrow
down arrow
to flip the card.
Question
What is a technique used to determine if someone is trying to falsely deny that they performed a particular action?

A)Auditing
B)Sneaking
C)Non-repudiation
D)Access Control Authorization
Question
An attack characterized by an explicit attempt by attackers to prevent legitimate users from accessing a system is called:

A)denial of service.
B)social engineering.
C)spoofing.
D)war-dialing.
Question
Encryption and virtual private networks are techniques used to secure which of the following?

A)Data
B)Firewalls
C)Proxy servers
D)Connection points
Question
Which of the following is NOT a connectivity device used to connect machines on a network?

A)Hub
B)Switch
C)Proxy server
D)Network interface card
Question
Which is a technique used to provide false information about data packets?

A)Hacking
B)Spoofing
C)Phreaking
D)Social engineering
Question
A text file that is downloaded to a computer by a Web site to provide information about the Web site and online access is called a:

A)cookie
B)key logger
C)script kiddy
D)Trojan horse.
Question
The process of reviewing logs,records,and procedures to determine whether they meet appropriate standards is called:

A)auditing
B)filtering
C)sneaking
D)authenticating
Question
Which term is generally used by hackers to refer to attempts at intrusion into a system without permission and usually for malevolent purposes?

A)Hacking
B)Cracking
C)Blocking
D)Social engineering.
Question
The process of determining whether the credentials given by a user are authorized to access a particular network resource is called:

A)auditing
B)accessing
C)authorization
D)authentication
Question
Which of the following maintains a repository for information on virus outbreaks and detailed information about specific viruses?

A)CERT
B)F-Secure Corporation
C)Microsoft Security Advisor
D)SANS Institute
Question
A category of software that keeps track of users' activities on a computer is called ____________.
Question
____________ is a type of attack where header information on data packets is changed to provide false information.
Question
Which approach to security addresses both the system perimeter and individual systems within the network?

A)Perimeter security approach
B)Layered security approach
C)Dynamic security approach
D)Hybrid security approach
Question
In addition to mandating federal agencies to establish security measures,the Computer Security Act of 1987 defined important terms such as:

A)sensitive information
B)unauthorized access
C)private information
D)security information
Question
A(n)____________ serves as a barrier to unauthorized communication between a network and the outside world.
Question
Those who exploit systems for harm such as to erase files,change data,or deface Web sites are typically called:

A)white hat hackers
B)gray hat hackers
C)red hat hackers
D)black hat hackers
Question
A term used to describe calling numerous telephone numbers,usually sequentially,in hopes of reaching a computer to attempt to hack into is called ____________.
Question
Another name for an ethical hacker operating legally and with permission is ____________.
Question
Which is NOT one of the three broad classes of security threats?

A)Malicious software
B)Disclosing contents of private networks
C)Gaining unauthorized access into a system
D)Preventing or blocking access to a system
Question
____________ refers to a process used to locate wireless networks that might be vulnerable to attack.
Question
The first computer incident-response team was sponsored by ____________ University.
Question
Flooding a system with many false connection attempts in an effort to prevent legitimate use is an example of a ____________ attack.
Question
The preferred paradigm,or approach to security,is a ____________ approach.
Question
Since they are easier to perpetrate than intrusions,____________ attacks are the most common form of attack after viruses.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction to Network Security
1
Which approach to security is proactive in addressing potential threats before they occur?

A)Passive security approach
B)Layered security approach
C)Dynamic security approach
D)Hybrid security approach
C
2
What is a technique used to determine if someone is trying to falsely deny that they performed a particular action?

A)Auditing
B)Sneaking
C)Non-repudiation
D)Access Control Authorization
C
3
An attack characterized by an explicit attempt by attackers to prevent legitimate users from accessing a system is called:

A)denial of service.
B)social engineering.
C)spoofing.
D)war-dialing.
A
4
Encryption and virtual private networks are techniques used to secure which of the following?

A)Data
B)Firewalls
C)Proxy servers
D)Connection points
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT a connectivity device used to connect machines on a network?

A)Hub
B)Switch
C)Proxy server
D)Network interface card
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Which is a technique used to provide false information about data packets?

A)Hacking
B)Spoofing
C)Phreaking
D)Social engineering
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
A text file that is downloaded to a computer by a Web site to provide information about the Web site and online access is called a:

A)cookie
B)key logger
C)script kiddy
D)Trojan horse.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
The process of reviewing logs,records,and procedures to determine whether they meet appropriate standards is called:

A)auditing
B)filtering
C)sneaking
D)authenticating
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Which term is generally used by hackers to refer to attempts at intrusion into a system without permission and usually for malevolent purposes?

A)Hacking
B)Cracking
C)Blocking
D)Social engineering.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
The process of determining whether the credentials given by a user are authorized to access a particular network resource is called:

A)auditing
B)accessing
C)authorization
D)authentication
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following maintains a repository for information on virus outbreaks and detailed information about specific viruses?

A)CERT
B)F-Secure Corporation
C)Microsoft Security Advisor
D)SANS Institute
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
A category of software that keeps track of users' activities on a computer is called ____________.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
____________ is a type of attack where header information on data packets is changed to provide false information.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which approach to security addresses both the system perimeter and individual systems within the network?

A)Perimeter security approach
B)Layered security approach
C)Dynamic security approach
D)Hybrid security approach
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
In addition to mandating federal agencies to establish security measures,the Computer Security Act of 1987 defined important terms such as:

A)sensitive information
B)unauthorized access
C)private information
D)security information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
A(n)____________ serves as a barrier to unauthorized communication between a network and the outside world.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Those who exploit systems for harm such as to erase files,change data,or deface Web sites are typically called:

A)white hat hackers
B)gray hat hackers
C)red hat hackers
D)black hat hackers
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
A term used to describe calling numerous telephone numbers,usually sequentially,in hopes of reaching a computer to attempt to hack into is called ____________.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Another name for an ethical hacker operating legally and with permission is ____________.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Which is NOT one of the three broad classes of security threats?

A)Malicious software
B)Disclosing contents of private networks
C)Gaining unauthorized access into a system
D)Preventing or blocking access to a system
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
____________ refers to a process used to locate wireless networks that might be vulnerable to attack.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
The first computer incident-response team was sponsored by ____________ University.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Flooding a system with many false connection attempts in an effort to prevent legitimate use is an example of a ____________ attack.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
The preferred paradigm,or approach to security,is a ____________ approach.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Since they are easier to perpetrate than intrusions,____________ attacks are the most common form of attack after viruses.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.