Deck 10: Introduction to Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/48
Play
Full screen (f)
Deck 10: Introduction to Network Security
1
____ is the standard software service on many Linux distributions for authenticating users.
A)Password Policy
B)Shadow
C)MMC
D)PAM
A)Password Policy
B)Shadow
C)MMC
D)PAM
D
2
WEP, the successor to WPA, has enhancements that make it much more difficult to crack the encryption code.
False
3
____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.
A)PPTP
B)L2TP
C)PPP
D)SLIP
A)PPTP
B)L2TP
C)PPP
D)SLIP
B
4
____ allows administrators to control who has access to the network.
A)Authentication
B)Authorization
C)Logging
D)Penetration testing
A)Authentication
B)Authorization
C)Logging
D)Penetration testing
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
5
____ allows administrators to control what users can do after they are logged on to the network.
A)Authentication
B)Authorization
C)Logging
D)Penetration testing
A)Authentication
B)Authorization
C)Logging
D)Penetration testing
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
6
A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
7
On Linux systems, the passwords can be stored in an encrypted format in the ____ file located in the /etc directory.
A)password
B)passwd
C)shadow
D)pwd
A)password
B)passwd
C)shadow
D)pwd
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
8
In Windows OSs, with ____ permissions administrators can assign permissions to files as well as folders, so one level of permission can be assigned to a folder but a different level of permission assigned to files in the folder, if needed.
A)sharing
B)NTFS
C)folder
D)access
A)sharing
B)NTFS
C)folder
D)access
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
9
____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.
A)Digital
B)Kerberos
C)PAM
D)VPN
A)Digital
B)Kerberos
C)PAM
D)VPN
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
10
A VPN is limited to dial-up connections.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
11
With ____, a user running a Windows OS can dial up a Windows server when it's running Routing and Remote Access Service (RRAS).
A)PPTP
B)IDS
C)PPP
D)SLIP
A)PPTP
B)IDS
C)PPP
D)SLIP
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
12
Encryption prevents somebody using eavesdropping technology, such as a(n)____, from capturing packets and using data in the packets for malicious purposes.
A)IDS
B)VPN
C)rootkit
D)packet sniffer
A)IDS
B)VPN
C)rootkit
D)packet sniffer
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
13
IPSec works by establishing a(n)____ between two communicating devices.
A)circuit
B)channel
C)association
D)tunnel
A)circuit
B)channel
C)association
D)tunnel
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
14
On Linux systems, a simple method to encrypt files involves using a command-line program called ____.
A)gpg
B)efs
C)ipsec
D)tar
A)gpg
B)efs
C)ipsec
D)tar
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
15
____ are temporary or permanent connections across a public network-such as the Internet-that use encryption technology to transmit and receive data.
A)IDSs
B)RRASs
C)Firewalls
D)VPNs
A)IDSs
B)RRASs
C)Firewalls
D)VPNs
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
16
The most popular method for encrypting data as it travels network media is to use an extension to the IP protocol called ____.
A)SSL
B)VPN
C)IPSec
D)SSH
A)SSL
B)VPN
C)IPSec
D)SSH
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
17
IPSec is an excellent way to secure data as it travels across a network, and to secure data on disk drives to block someone from gaining unauthorized access to the computer.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
18
Windows OSs ____ permissions are applied to folders (and only folders)shared over the network.
A)sharing
B)NTFS
C)folder
D)access
A)sharing
B)NTFS
C)folder
D)access
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
19
An intrusion detection system (IDS)usually works with a firewall or router with access control lists.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
20
Spam is simply unsolicited e-mail.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
21
In Windows XP, Vista, and Server 2003, _________________________ (EFS)is a standard feature available on NTFS-formatted disks.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
22
What are the basic guidelines that a network security policy should follow?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
23
____ are a form of Trojan programs that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords.
A)Worms
B)Rootkits
C)Backdoors
D)Packet sniffers
A)Worms
B)Rootkits
C)Backdoors
D)Packet sniffers
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
24
What are the elements of a security policy? Briefly describe each.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
25
Firewalls can attempt to determine the context of a packet; this process is called ______________________________ (SPI).
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ is a program that spreads by replicating itself into other programs or documents.
A)worm
B)virus
C)backdoor
D)malware
A)worm
B)virus
C)backdoor
D)malware
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
27
____ monitors or in some way controls part of your computer at the expense of your privacy and to the gain of some third party.
A)Spyware
B)A rootkit
C)A Trojan program
D)A backdoor
A)Spyware
B)A rootkit
C)A Trojan program
D)A backdoor
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
28
What is a highly restrictive security policy?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
29
A(n)____ attack is an attacker's attempt to tie up network bandwidth or network services so that it renders those resources useless to legitimate users.
A)spoofed address
B)ping flood
C)IDS
D)DoS
A)spoofed address
B)ping flood
C)IDS
D)DoS
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)____________________ address is a source address inserted into the packet that isn't the actual address of the sending station.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
31
Digital certificates involve a third party called a(n)_________________________ (CA).
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
32
Describe some of the physical security best practices.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
33
A ____ is similar to a virus in that it's self-replicating, but it doesn't attach itself to another program; rather, it's a self-contained program.
A)worm
B)rootkit
C)backdoor
D)malware
A)worm
B)rootkit
C)backdoor
D)malware
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
34
______________________________ (WEP)provides data encryption so that a casual attacker who gains access to your wireless signals sees only encrypted gibberish.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
35
Viruses, worms, and rootkits are part of a broader category of software called ____________________, which is any software designed to cause harm or disruption to a computer system or perform activities on a computer without the consent of the computer's owner.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
36
A(n)____________________ firewall is installed on a computer or server and simply inspects all packets coming into or leaving the computer.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
37
Attackers who drive around looking for wireless LANs to intercept are called ____.
A)Trojans
B)worms
C)packet sniffers
D)wardrivers
A)Trojans
B)worms
C)packet sniffers
D)wardrivers
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
38
A(n)____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.
A)gateway
B)IDS
C)firewall
D)router
A)gateway
B)IDS
C)firewall
D)router
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ is a program installed on a computer that permits access to the computer, bypassing the normal authentication process.
A)worm
B)rootkit
C)backdoor
D)malware
A)worm
B)rootkit
C)backdoor
D)malware
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
40
A ____ program appears to be something useful, such as a free utility, but in reality contains some type of malware.
A)worm
B)rootkit
C)backdoor
D)Trojan
A)worm
B)rootkit
C)backdoor
D)Trojan
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
42
What is a hoax virus?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
43
How can you use NAT to improve security?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
44
What is the 802.11i standard?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
45
What are the rules or guidelines for creating secure passwords?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
46
What are the benefits of using VPNs?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
47
How can you create VPNs in a Windows environment?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
48
Can you use a firewall as a router? Explain.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck