Deck 14: Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 14: Network Security
1
____ is an industry-standard protocol that simply provides authentication service.
A) TACACS+
B) SSL
C) RADIUS
D) TLS
A) TACACS+
B) SSL
C) RADIUS
D) TLS
C
2
The ____ protocol is governed by RFC 2865 and can be used with cross-platform integration.
A) RADIUS
B) TACACS+
C) SSL
D) CHAP
A) RADIUS
B) TACACS+
C) SSL
D) CHAP
A
3
A computer program that can infect a computer without the knowledge or permission of the user is a(n)____.
A) Worm
B) Macro Virus
C) Logic bomb
D) Virus
A) Worm
B) Macro Virus
C) Logic bomb
D) Virus
D
4
The ____ firewall topology consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host.
A) packet-filtering router
B) demilitarized zone
C) single-homed bastion
D) dual-homed bastion
A) packet-filtering router
B) demilitarized zone
C) single-homed bastion
D) dual-homed bastion
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The Cisco ____ service will examine your router and recommend which services should be disabled.
A) CHAP
B) RADIUS
C) SSH
D) SDM
A) CHAP
B) RADIUS
C) SSH
D) SDM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ virus is a virus that infects a computer's master boot record.
A) stealth
B) boot-sector
C) polymorphic
D) logic bomb
A) stealth
B) boot-sector
C) polymorphic
D) logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
When a user opens an infected application file or document, a(n) ____ attaches itself to the application and infects other files accessed by the same application.
A) macro virus
B) worm
C) Trojan
D) logic bomb
A) macro virus
B) worm
C) Trojan
D) logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ is a piece of code inserted into a program that will perform specific malicious functions when specified conditions are met.
A) logic bomb
B) Trojan Horse
C) macro virus
D) worm
A) logic bomb
B) Trojan Horse
C) macro virus
D) worm
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a means of encrypting a session between two hosts through the use of digital certificates, which are based on asymmetric key encryption.
A) CHAP
B) RADIUS
C) DMZ
D) SSL
A) CHAP
B) RADIUS
C) DMZ
D) SSL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The virus prevention industry is a proactive industry.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ is the most secure firewall solution.
A) dual-homed bastion
B) DMZ
C) packet-filtering router
D) single-homed bastion
A) dual-homed bastion
B) DMZ
C) packet-filtering router
D) single-homed bastion
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ virus is so named because it attempts to hide itself from detection.
A) logic bomb
B) polymorphic
C) stealth
D) boot-sector
A) logic bomb
B) polymorphic
C) stealth
D) boot-sector
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ topology works like a single-homed bastion topology, except that it has two network adapter cards in it and two IP addresses, one for each network it is connected to.
A) demilitarized zone
B) single-router zone
C) packet-filtering router
D) dual-homed bastion
A) demilitarized zone
B) single-router zone
C) packet-filtering router
D) dual-homed bastion
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A single-homed bastion has two network interface cards and is assigned two IP addresses.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ are a popular technology for creating a connection between an external computer and a corporate site over the Internet.
A) Firewalls
B) DMZs
C) VPNs
D) Packet-filtering routers
A) Firewalls
B) DMZs
C) VPNs
D) Packet-filtering routers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
An effective security policy implements multiple layers of security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ is a patch management software package.
A) Symantec's Altiris
B) Microsoft's CLI
C) Cisco's SWC
D) Cisco's SDM
A) Symantec's Altiris
B) Microsoft's CLI
C) Cisco's SWC
D) Cisco's SDM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The ____ is the least protective of the four firewall topologies.
A) dual-homed bastion
B) packet-filtering router
C) single-homed bastion
D) demilitarized zone
A) dual-homed bastion
B) packet-filtering router
C) single-homed bastion
D) demilitarized zone
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
All devices in a RADIUS authentication stream have to be Cisco devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
After virus prevention software has been installed, it must be updated regularly to ensure your network is protected against all the latest malware threats.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
What are the goals of a security policy?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Why is it important to have a patch management program?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Briefly describe a Virtual Private Network (VPN)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
A client-to-site VPN is also known as a ____ VPN.
A) remote user
B) client-to-server
C) site-to-site
D) client-to-client
A) remote user
B) client-to-server
C) site-to-site
D) client-to-client
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Briefly describe a client-to-site VPN.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
A(n) ____ is a configuration value (or simply stated, a command) that allows you to establish an IPSEC VPN on a Cisco firewall.
A) IKE set
B) transform set
C) AH script
D) SDM set
A) IKE set
B) transform set
C) AH script
D) SDM set
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A ____ VPN allows designated users to have access to the corporate network from remote locations.
A) site-to-site
B) client-to-site
C) user-to-user
D) user-to-server
A) site-to-site
B) client-to-site
C) user-to-user
D) user-to-server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
____ is a tunneling protocol that was developed by Microsoft and was extremely popular at one time for remote users who had to dial in to the corporate network on a secure channel.
A) GRE
B) L2TP
C) PPTP
D) IPSec
A) GRE
B) L2TP
C) PPTP
D) IPSec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Briefly explain how to protect an organization's hardware.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Why is user training paramount in protecting against viruses?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ refers to malicious programs that have many different capabilities. Some might do something relatively harmless, such as opening files on a CD-ROM; others might be extremely destructive, perhaps destroying all of the data on a computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
____ is a suite of protocols, accepted as an industry standard, which provides secure data transmission over layer 3 of the OSI model.
A) L2TP
B) PPTP
C) GRE
D) IPSec
A) L2TP
B) PPTP
C) GRE
D) IPSec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Briefly explain encryption at the network level.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
A ____ VPN allows multiple corporate sites to be connected over low-cost Internet connections.
A) server-to-client
B) site-to-site
C) client-to-site
D) site-to-client
A) server-to-client
B) site-to-site
C) client-to-site
D) site-to-client
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) ___________________________________ is like an IDS, except that it is placed in line so all packets coming in or going out of the network pass through it.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In network security, a(n) ____________________ is an official approval that allows a user to access a specific network resource.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) ____________________ is a server running a single application, such as a proxy server or specialized firewall software.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are some of the items that a security policy should include?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
____________________ is the process by which users verify to a server that they are who they say they are.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are some unnecessary services on most networks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the two IPSec protocols that have been developed to provide packet-level security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck