Deck 12: Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 12: Network Security
1
Human errors,ignorance,and omissions cause more than half of all security breaches sustained by networks.
True
2
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
A) flashing
B) denial-of-service
C) dictionary
D) brute force
A) flashing
B) denial-of-service
C) dictionary
D) brute force
C
3
A(n)____ is a password-protected and encrypted file that holds an individual's identification information,including a public key.
A) digital certificate
B) authentication file
C) access control list
D) authentication certificate
A) digital certificate
B) authentication file
C) access control list
D) authentication certificate
A
4
A ____ attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
A) flashing
B) denial-of-service
C) war driving
D) phishing
A) flashing
B) denial-of-service
C) war driving
D) phishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
____ software searches a node for open ports.
A) Phishing
B) Sniffing
C) Authentication
D) Port scanner
A) Phishing
B) Sniffing
C) Authentication
D) Port scanner
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.
A) people
B) transmission and hardware
C) protocols and software
D) Internet access
A) people
B) transmission and hardware
C) protocols and software
D) Internet access
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
A) Cracking
B) Hacking
C) War driving
D) Phishing
A) Cracking
B) Hacking
C) War driving
D) Phishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
By default,the 802.11 standard offers substantial security.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Encryption is the last means of defense against data theft.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
A) switch's
B) gateway's
C) router's
D) proxy server's
A) switch's
B) gateway's
C) router's
D) proxy server's
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The combination of a public key and a private key is known as a ____.
A) key lock
B) key frame
C) key pair
D) key set
A) key lock
B) key frame
C) key pair
D) key set
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
In a ____ attack,a person redirects or captures secure transmissions as they occur.
A) denial-of service
B) man-in-the-middle
C) war driving
D) phishing
A) denial-of service
B) man-in-the-middle
C) war driving
D) phishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.
A) flashing
B) denial-of-service
C) war driving
D) phishing
A) flashing
B) denial-of-service
C) war driving
D) phishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
A) flashing
B) denial-of-service
C) dictionary
D) brute force
A) flashing
B) denial-of-service
C) dictionary
D) brute force
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Network security is more often compromised "from the inside" than from external sources.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A ____ firewall is a router (or a computer installed with software that enables it to act as a router)that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
A) packet-filtering
B) gateway
C) proxy
D) selective
A) packet-filtering
B) gateway
C) proxy
D) selective
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
An NOS that contains a "back door"is an example of a risk associated with ____.
A) people
B) transmission and hardware
C) protocols and software
D) Internet access
A) people
B) transmission and hardware
C) protocols and software
D) Internet access
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
A) PGP
B) SSH
C) IPSec
D) SSL
A) PGP
B) SSH
C) IPSec
D) SSL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The use of certificate authorities to associate public keys with certain users is known as ____.
A) PGP
B) PKI
C) IPSec
D) SSL
A) PGP
B) PKI
C) IPSec
D) SSL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A security policy should state exactly which hardware,software,architecture,or protocols will be used to ensure security.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
Software that can react to suspicious activity.
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
Software that can react to suspicious activity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
In general,information is ____________________ if it could be used by other parties to impair an organization's functioning,decrease customers' confidence,cause a financial loss,damage an organization's status,or give a significant advantage to a competitor.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A(n)____________________ identifies an organization's security risks,levels of authority,designated security coordinator and team members,responsibilities for each team member,and responsibilities for each employee.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
A) router
B) service
C) concentrator
D) certificate authority
A) router
B) service
C) concentrator
D) certificate authority
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)____________________ is a software application on a network host that acts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
Software that can only detect and log suspicious activity.
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
Software that can only detect and log suspicious activity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
____ is a method of encrypting TCP/IP transmissions.
A) PGP
B) IPSec
C) PAP
D) SSL
A) PGP
B) IPSec
C) PAP
D) SSL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
RADIUS and TACACS belong to a category of protocols known as AAA (____).
A) access, authorization, and accounting
B) authentication, authorization, and accounting
C) authentication, authorization, and authority
D) authentication, authorization, and access
A) access, authorization, and accounting
B) authentication, authorization, and accounting
C) authentication, authorization, and authority
D) authentication, authorization, and access
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
Data is encrypted using a single key.
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
Data is encrypted using a single key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
In ____,both computers verify the credentials of the other.
A) mutual authorization
B) mutual access
C) mutual authentication
D) mutual verification
A) mutual authorization
B) mutual access
C) mutual authentication
D) mutual verification
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
A firewall that can view a data stream.
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
A firewall that can view a data stream.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
A firewall that can block designated types of traffic based on application data contained within packets.
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
A firewall that can block designated types of traffic based on application data contained within packets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
A firewall that protects only the computer on which it is installed.
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
A firewall that protects only the computer on which it is installed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
Data is encrypted using two keys.
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
Data is encrypted using two keys.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
A software application on a network host that acts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic.
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
A software application on a network host that acts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
The host that runs the proxy service.
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
The host that runs the proxy service.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
In ____ ,a hacker forges name server records to falsify his host's identity.
A) IP spoofing
B) DNS spoofing
C) ID spoofing
D) DHCP spoofing
A) IP spoofing
B) DNS spoofing
C) ID spoofing
D) DHCP spoofing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
____ protocols are the rules that computers follow to accomplish authentication.
A) Access
B) Availability
C) Authority
D) Authentication
A) Access
B) Availability
C) Authority
D) Authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the three-way handshake used in CHAP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Define and describe PAP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe one potential flaw in CHAP and MS-CHAP authentication and explain how it is resolved.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe the two phases IPSec use to accomplish authentication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe who should conduct a security audit and advantages,if any.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe what distinguishes 802.1x from other authentication standards.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe the SCP (Secure CoPy)utility.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Define SSH (secure shell)and explain threats it guards against.Include an explanation of the encryption algorithms that may be used with it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe an advantage of using EAP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck