Deck 14: Network Security

Full screen (f)
exit full mode
Question
____ is an industry-standard protocol that simply provides authentication service.

A) TACACS+
B) SSL
C) RADIUS
D) TLS
Use Space or
up arrow
down arrow
to flip the card.
Question
The ____ protocol is governed by RFC 2865 and can be used with cross-platform integration.

A) RADIUS
B) TACACS+
C) SSL
D) CHAP
Question
A computer program that can infect a computer without the knowledge or permission of the user is a(n)____.

A) Worm
B) Macro Virus
C) Logic bomb
D) Virus
Question
The ____ firewall topology consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host.

A) packet-filtering router
B) demilitarized zone
C) single-homed bastion
D) dual-homed bastion
Question
The Cisco ____ service will examine your router and recommend which services should be disabled.

A) CHAP
B) RADIUS
C) SSH
D) SDM
Question
A ____ virus is a virus that infects a computer's master boot record.

A) stealth
B) boot-sector
C) polymorphic
D) logic bomb
Question
When a user opens an infected application file or document, a(n) ____ attaches itself to the application and infects other files accessed by the same application.

A) macro virus
B) worm
C) Trojan
D) logic bomb
Question
A ____ is a piece of code inserted into a program that will perform specific malicious functions when specified conditions are met.

A) logic bomb
B) Trojan Horse
C) macro virus
D) worm
Question
____ is a means of encrypting a session between two hosts through the use of digital certificates, which are based on asymmetric key encryption.

A) CHAP
B) RADIUS
C) DMZ
D) SSL
Question
The virus prevention industry is a proactive industry.
Question
The ____ is the most secure firewall solution.

A) dual-homed bastion
B) DMZ
C) packet-filtering router
D) single-homed bastion
Question
A ____ virus is so named because it attempts to hide itself from detection.

A) logic bomb
B) polymorphic
C) stealth
D) boot-sector
Question
A ____ topology works like a single-homed bastion topology, except that it has two network adapter cards in it and two IP addresses, one for each network it is connected to.

A) demilitarized zone
B) single-router zone
C) packet-filtering router
D) dual-homed bastion
Question
A single-homed bastion has two network interface cards and is assigned two IP addresses.
Question
____ are a popular technology for creating a connection between an external computer and a corporate site over the Internet.

A) Firewalls
B) DMZs
C) VPNs
D) Packet-filtering routers
Question
An effective security policy implements multiple layers of security.
Question
____ is a patch management software package.

A) Symantec's Altiris
B) Microsoft's CLI
C) Cisco's SWC
D) Cisco's SDM
Question
The ____ is the least protective of the four firewall topologies.

A) dual-homed bastion
B) packet-filtering router
C) single-homed bastion
D) demilitarized zone
Question
All devices in a RADIUS authentication stream have to be Cisco devices.
Question
After virus prevention software has been installed, it must be updated regularly to ensure your network is protected against all the latest malware threats.
Question
What are the goals of a security policy?
Question
Why is it important to have a patch management program?
Question
Briefly describe a Virtual Private Network (VPN)?
Question
A client-to-site VPN is also known as a ____ VPN.

A) remote user
B) client-to-server
C) site-to-site
D) client-to-client
Question
Briefly describe a client-to-site VPN.
Question
A(n) ____ is a configuration value (or simply stated, a command) that allows you to establish an IPSEC VPN on a Cisco firewall.

A) IKE set
B) transform set
C) AH script
D) SDM set
Question
A ____ VPN allows designated users to have access to the corporate network from remote locations.

A) site-to-site
B) client-to-site
C) user-to-user
D) user-to-server
Question
____ is a tunneling protocol that was developed by Microsoft and was extremely popular at one time for remote users who had to dial in to the corporate network on a secure channel.

A) GRE
B) L2TP
C) PPTP
D) IPSec
Question
Briefly explain how to protect an organization's hardware.
Question
Why is user training paramount in protecting against viruses?
Question
____________________ refers to malicious programs that have many different capabilities. Some might do something relatively harmless, such as opening files on a CD-ROM; others might be extremely destructive, perhaps destroying all of the data on a computer.
Question
____ is a suite of protocols, accepted as an industry standard, which provides secure data transmission over layer 3 of the OSI model.

A) L2TP
B) PPTP
C) GRE
D) IPSec
Question
Briefly explain encryption at the network level.
Question
A ____ VPN allows multiple corporate sites to be connected over low-cost Internet connections.

A) server-to-client
B) site-to-site
C) client-to-site
D) site-to-client
Question
A(n) ___________________________________ is like an IDS, except that it is placed in line so all packets coming in or going out of the network pass through it.
Question
In network security, a(n) ____________________ is an official approval that allows a user to access a specific network resource.
Question
A(n) ____________________ is a server running a single application, such as a proxy server or specialized firewall software.
Question
What are some of the items that a security policy should include?
Question
____________________ is the process by which users verify to a server that they are who they say they are.
Question
What are some unnecessary services on most networks?
Question
Match between columns
a security device that can detect a hacker's attempts to gain access to the network
Polymorphic virus
a security device that can detect a hacker's attempts to gain access to the network
Security policy
a security device that can detect a hacker's attempts to gain access to the network
Symmetric key encryption
a security device that can detect a hacker's attempts to gain access to the network
Asymmetric key encryption
a security device that can detect a hacker's attempts to gain access to the network
Physical security
a security device that can detect a hacker's attempts to gain access to the network
IDS
a security device that can detect a hacker's attempts to gain access to the network
Trojan Horse
a security device that can detect a hacker's attempts to gain access to the network
Firewall
a security device that can detect a hacker's attempts to gain access to the network
Worm
these viruses change their appearance each time they replicate or infect
Polymorphic virus
these viruses change their appearance each time they replicate or infect
Security policy
these viruses change their appearance each time they replicate or infect
Symmetric key encryption
these viruses change their appearance each time they replicate or infect
Asymmetric key encryption
these viruses change their appearance each time they replicate or infect
Physical security
these viruses change their appearance each time they replicate or infect
IDS
these viruses change their appearance each time they replicate or infect
Trojan Horse
these viruses change their appearance each time they replicate or infect
Firewall
these viruses change their appearance each time they replicate or infect
Worm
type of malware that appears to perform a desired function but in fact performs malicious functions
Polymorphic virus
type of malware that appears to perform a desired function but in fact performs malicious functions
Security policy
type of malware that appears to perform a desired function but in fact performs malicious functions
Symmetric key encryption
type of malware that appears to perform a desired function but in fact performs malicious functions
Asymmetric key encryption
type of malware that appears to perform a desired function but in fact performs malicious functions
Physical security
type of malware that appears to perform a desired function but in fact performs malicious functions
IDS
type of malware that appears to perform a desired function but in fact performs malicious functions
Trojan Horse
type of malware that appears to perform a desired function but in fact performs malicious functions
Firewall
type of malware that appears to perform a desired function but in fact performs malicious functions
Worm
the primary method of keeping hackers out of a network
Polymorphic virus
the primary method of keeping hackers out of a network
Security policy
the primary method of keeping hackers out of a network
Symmetric key encryption
the primary method of keeping hackers out of a network
Asymmetric key encryption
the primary method of keeping hackers out of a network
Physical security
the primary method of keeping hackers out of a network
IDS
the primary method of keeping hackers out of a network
Trojan Horse
the primary method of keeping hackers out of a network
Firewall
the primary method of keeping hackers out of a network
Worm
a single-key encryption method
Polymorphic virus
a single-key encryption method
Security policy
a single-key encryption method
Symmetric key encryption
a single-key encryption method
Asymmetric key encryption
a single-key encryption method
Physical security
a single-key encryption method
IDS
a single-key encryption method
Trojan Horse
a single-key encryption method
Firewall
a single-key encryption method
Worm
an organization's set of rules regarding how to handle and protect sensitive data
Polymorphic virus
an organization's set of rules regarding how to handle and protect sensitive data
Security policy
an organization's set of rules regarding how to handle and protect sensitive data
Symmetric key encryption
an organization's set of rules regarding how to handle and protect sensitive data
Asymmetric key encryption
an organization's set of rules regarding how to handle and protect sensitive data
Physical security
an organization's set of rules regarding how to handle and protect sensitive data
IDS
an organization's set of rules regarding how to handle and protect sensitive data
Trojan Horse
an organization's set of rules regarding how to handle and protect sensitive data
Firewall
an organization's set of rules regarding how to handle and protect sensitive data
Worm
uses a mathematically matched key pair
Polymorphic virus
uses a mathematically matched key pair
Security policy
uses a mathematically matched key pair
Symmetric key encryption
uses a mathematically matched key pair
Asymmetric key encryption
uses a mathematically matched key pair
Physical security
uses a mathematically matched key pair
IDS
uses a mathematically matched key pair
Trojan Horse
uses a mathematically matched key pair
Firewall
uses a mathematically matched key pair
Worm
the first level of security in any network
Polymorphic virus
the first level of security in any network
Security policy
the first level of security in any network
Symmetric key encryption
the first level of security in any network
Asymmetric key encryption
the first level of security in any network
Physical security
the first level of security in any network
IDS
the first level of security in any network
Trojan Horse
the first level of security in any network
Firewall
the first level of security in any network
Worm
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Polymorphic virus
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Security policy
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Symmetric key encryption
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Asymmetric key encryption
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Physical security
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
IDS
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Trojan Horse
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Firewall
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Worm
Question
Describe the two IPSec protocols that have been developed to provide packet-level security.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Network Security
1
____ is an industry-standard protocol that simply provides authentication service.

A) TACACS+
B) SSL
C) RADIUS
D) TLS
C
2
The ____ protocol is governed by RFC 2865 and can be used with cross-platform integration.

A) RADIUS
B) TACACS+
C) SSL
D) CHAP
A
3
A computer program that can infect a computer without the knowledge or permission of the user is a(n)____.

A) Worm
B) Macro Virus
C) Logic bomb
D) Virus
D
4
The ____ firewall topology consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host.

A) packet-filtering router
B) demilitarized zone
C) single-homed bastion
D) dual-homed bastion
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The Cisco ____ service will examine your router and recommend which services should be disabled.

A) CHAP
B) RADIUS
C) SSH
D) SDM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ virus is a virus that infects a computer's master boot record.

A) stealth
B) boot-sector
C) polymorphic
D) logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
When a user opens an infected application file or document, a(n) ____ attaches itself to the application and infects other files accessed by the same application.

A) macro virus
B) worm
C) Trojan
D) logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ is a piece of code inserted into a program that will perform specific malicious functions when specified conditions are met.

A) logic bomb
B) Trojan Horse
C) macro virus
D) worm
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a means of encrypting a session between two hosts through the use of digital certificates, which are based on asymmetric key encryption.

A) CHAP
B) RADIUS
C) DMZ
D) SSL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The virus prevention industry is a proactive industry.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ is the most secure firewall solution.

A) dual-homed bastion
B) DMZ
C) packet-filtering router
D) single-homed bastion
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ virus is so named because it attempts to hide itself from detection.

A) logic bomb
B) polymorphic
C) stealth
D) boot-sector
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ topology works like a single-homed bastion topology, except that it has two network adapter cards in it and two IP addresses, one for each network it is connected to.

A) demilitarized zone
B) single-router zone
C) packet-filtering router
D) dual-homed bastion
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A single-homed bastion has two network interface cards and is assigned two IP addresses.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ are a popular technology for creating a connection between an external computer and a corporate site over the Internet.

A) Firewalls
B) DMZs
C) VPNs
D) Packet-filtering routers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
An effective security policy implements multiple layers of security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ is a patch management software package.

A) Symantec's Altiris
B) Microsoft's CLI
C) Cisco's SWC
D) Cisco's SDM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The ____ is the least protective of the four firewall topologies.

A) dual-homed bastion
B) packet-filtering router
C) single-homed bastion
D) demilitarized zone
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
All devices in a RADIUS authentication stream have to be Cisco devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
After virus prevention software has been installed, it must be updated regularly to ensure your network is protected against all the latest malware threats.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
What are the goals of a security policy?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Why is it important to have a patch management program?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Briefly describe a Virtual Private Network (VPN)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
A client-to-site VPN is also known as a ____ VPN.

A) remote user
B) client-to-server
C) site-to-site
D) client-to-client
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Briefly describe a client-to-site VPN.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
A(n) ____ is a configuration value (or simply stated, a command) that allows you to establish an IPSEC VPN on a Cisco firewall.

A) IKE set
B) transform set
C) AH script
D) SDM set
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A ____ VPN allows designated users to have access to the corporate network from remote locations.

A) site-to-site
B) client-to-site
C) user-to-user
D) user-to-server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
____ is a tunneling protocol that was developed by Microsoft and was extremely popular at one time for remote users who had to dial in to the corporate network on a secure channel.

A) GRE
B) L2TP
C) PPTP
D) IPSec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Briefly explain how to protect an organization's hardware.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Why is user training paramount in protecting against viruses?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ refers to malicious programs that have many different capabilities. Some might do something relatively harmless, such as opening files on a CD-ROM; others might be extremely destructive, perhaps destroying all of the data on a computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
____ is a suite of protocols, accepted as an industry standard, which provides secure data transmission over layer 3 of the OSI model.

A) L2TP
B) PPTP
C) GRE
D) IPSec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Briefly explain encryption at the network level.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
A ____ VPN allows multiple corporate sites to be connected over low-cost Internet connections.

A) server-to-client
B) site-to-site
C) client-to-site
D) site-to-client
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) ___________________________________ is like an IDS, except that it is placed in line so all packets coming in or going out of the network pass through it.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In network security, a(n) ____________________ is an official approval that allows a user to access a specific network resource.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) ____________________ is a server running a single application, such as a proxy server or specialized firewall software.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are some of the items that a security policy should include?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
____________________ is the process by which users verify to a server that they are who they say they are.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are some unnecessary services on most networks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
a security device that can detect a hacker's attempts to gain access to the network
Polymorphic virus
a security device that can detect a hacker's attempts to gain access to the network
Security policy
a security device that can detect a hacker's attempts to gain access to the network
Symmetric key encryption
a security device that can detect a hacker's attempts to gain access to the network
Asymmetric key encryption
a security device that can detect a hacker's attempts to gain access to the network
Physical security
a security device that can detect a hacker's attempts to gain access to the network
IDS
a security device that can detect a hacker's attempts to gain access to the network
Trojan Horse
a security device that can detect a hacker's attempts to gain access to the network
Firewall
a security device that can detect a hacker's attempts to gain access to the network
Worm
these viruses change their appearance each time they replicate or infect
Polymorphic virus
these viruses change their appearance each time they replicate or infect
Security policy
these viruses change their appearance each time they replicate or infect
Symmetric key encryption
these viruses change their appearance each time they replicate or infect
Asymmetric key encryption
these viruses change their appearance each time they replicate or infect
Physical security
these viruses change their appearance each time they replicate or infect
IDS
these viruses change their appearance each time they replicate or infect
Trojan Horse
these viruses change their appearance each time they replicate or infect
Firewall
these viruses change their appearance each time they replicate or infect
Worm
type of malware that appears to perform a desired function but in fact performs malicious functions
Polymorphic virus
type of malware that appears to perform a desired function but in fact performs malicious functions
Security policy
type of malware that appears to perform a desired function but in fact performs malicious functions
Symmetric key encryption
type of malware that appears to perform a desired function but in fact performs malicious functions
Asymmetric key encryption
type of malware that appears to perform a desired function but in fact performs malicious functions
Physical security
type of malware that appears to perform a desired function but in fact performs malicious functions
IDS
type of malware that appears to perform a desired function but in fact performs malicious functions
Trojan Horse
type of malware that appears to perform a desired function but in fact performs malicious functions
Firewall
type of malware that appears to perform a desired function but in fact performs malicious functions
Worm
the primary method of keeping hackers out of a network
Polymorphic virus
the primary method of keeping hackers out of a network
Security policy
the primary method of keeping hackers out of a network
Symmetric key encryption
the primary method of keeping hackers out of a network
Asymmetric key encryption
the primary method of keeping hackers out of a network
Physical security
the primary method of keeping hackers out of a network
IDS
the primary method of keeping hackers out of a network
Trojan Horse
the primary method of keeping hackers out of a network
Firewall
the primary method of keeping hackers out of a network
Worm
a single-key encryption method
Polymorphic virus
a single-key encryption method
Security policy
a single-key encryption method
Symmetric key encryption
a single-key encryption method
Asymmetric key encryption
a single-key encryption method
Physical security
a single-key encryption method
IDS
a single-key encryption method
Trojan Horse
a single-key encryption method
Firewall
a single-key encryption method
Worm
an organization's set of rules regarding how to handle and protect sensitive data
Polymorphic virus
an organization's set of rules regarding how to handle and protect sensitive data
Security policy
an organization's set of rules regarding how to handle and protect sensitive data
Symmetric key encryption
an organization's set of rules regarding how to handle and protect sensitive data
Asymmetric key encryption
an organization's set of rules regarding how to handle and protect sensitive data
Physical security
an organization's set of rules regarding how to handle and protect sensitive data
IDS
an organization's set of rules regarding how to handle and protect sensitive data
Trojan Horse
an organization's set of rules regarding how to handle and protect sensitive data
Firewall
an organization's set of rules regarding how to handle and protect sensitive data
Worm
uses a mathematically matched key pair
Polymorphic virus
uses a mathematically matched key pair
Security policy
uses a mathematically matched key pair
Symmetric key encryption
uses a mathematically matched key pair
Asymmetric key encryption
uses a mathematically matched key pair
Physical security
uses a mathematically matched key pair
IDS
uses a mathematically matched key pair
Trojan Horse
uses a mathematically matched key pair
Firewall
uses a mathematically matched key pair
Worm
the first level of security in any network
Polymorphic virus
the first level of security in any network
Security policy
the first level of security in any network
Symmetric key encryption
the first level of security in any network
Asymmetric key encryption
the first level of security in any network
Physical security
the first level of security in any network
IDS
the first level of security in any network
Trojan Horse
the first level of security in any network
Firewall
the first level of security in any network
Worm
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Polymorphic virus
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Security policy
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Symmetric key encryption
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Asymmetric key encryption
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Physical security
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
IDS
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Trojan Horse
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Firewall
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Worm
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the two IPSec protocols that have been developed to provide packet-level security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.