Deck 13: Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 13: Network Security
1
Information security controls are commonly classified in the industry as _____.
A)confidentiality,integrity and availability controls
B)firewalls,passwords and anti-virus systems
C)militarized and de-militarized zones
D)procedural,physical and technical controls
A)confidentiality,integrity and availability controls
B)firewalls,passwords and anti-virus systems
C)militarized and de-militarized zones
D)procedural,physical and technical controls
D
2
In network security,a firewall is a device which lies between two networks and _____.
A)regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network
B)regulates the movement of network administrators from the external network to the internal network
C)prevents fires in the external network from spreading to the internal network
D)None of the above
A)regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network
B)regulates the movement of network administrators from the external network to the internal network
C)prevents fires in the external network from spreading to the internal network
D)None of the above
A
3
Controls are _____.
A)weaknesses in an information system that can be exploited to compromise information security
B)capabilities,intentions and methods of adversaries to compromise information security
C)measures taken to mitigate the dangers from information security threats
D)restrictions on information to protect personal privacy
A)weaknesses in an information system that can be exploited to compromise information security
B)capabilities,intentions and methods of adversaries to compromise information security
C)measures taken to mitigate the dangers from information security threats
D)restrictions on information to protect personal privacy
C
4
Integrity is defined as _____.
A)maintaining restrictions on information to protect personal privacy
B)ensuring timely and reliable use of information
C)guarding against improper modification of information to ensure authenticity
D)None of the above
A)maintaining restrictions on information to protect personal privacy
B)ensuring timely and reliable use of information
C)guarding against improper modification of information to ensure authenticity
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Authentication is _____.
A)hiding information
B)providing an alternate identity
C)the verification of a claimed identity
D)granting certain specific privileges over information to a user
A)hiding information
B)providing an alternate identity
C)the verification of a claimed identity
D)granting certain specific privileges over information to a user
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
All the following are properties of asymmetric key encryption except _____.
A)it makes it easy to exchange the encryption key
B)it uses two keys
C)it is computationally simple
D)the key used for encryption cannot be used for decryption
A)it makes it easy to exchange the encryption key
B)it uses two keys
C)it is computationally simple
D)the key used for encryption cannot be used for decryption
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Vulnerabilities are _____.
A)weaknesses in an information system that can be exploited to compromise information security
B)capabilities,intentions and methods of adversaries to compromise information security
C)measures taken to mitigate the dangers from information security threats
D)restrictions on information to protect personal privacy
A)weaknesses in an information system that can be exploited to compromise information security
B)capabilities,intentions and methods of adversaries to compromise information security
C)measures taken to mitigate the dangers from information security threats
D)restrictions on information to protect personal privacy
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Confidentiality is defined as _____.
A)guarding against improper modification of information to ensure authenticity
B)maintaining restrictions on information to protect personal privacy
C)ensuring timely and reliable use of information
D)None of the above
A)guarding against improper modification of information to ensure authenticity
B)maintaining restrictions on information to protect personal privacy
C)ensuring timely and reliable use of information
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Availability is defined as _____.
A)guarding against improper modification of information to ensure authenticity
B)maintaining restrictions on information to protect personal privacy
C)encrypting information
D)ensuring timely and reliable use of information
A)guarding against improper modification of information to ensure authenticity
B)maintaining restrictions on information to protect personal privacy
C)encrypting information
D)ensuring timely and reliable use of information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
A denial-of-service attack _____.
A)blocks traffic from any identified host or network
B)typically only affects military computers
C)compromises the integrity of information
D)prevents a host from performing its legitimate functions
A)blocks traffic from any identified host or network
B)typically only affects military computers
C)compromises the integrity of information
D)prevents a host from performing its legitimate functions
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Encryption is the process of _____.
A)rendering information unreadable in such a way that authorized users may later make the information readable
B)adding a password to information
C)placing information behind a firewall
D)placing information in the de-militarized zone
A)rendering information unreadable in such a way that authorized users may later make the information readable
B)adding a password to information
C)placing information behind a firewall
D)placing information in the de-militarized zone
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
In symmetric key encryption _____.
A)the key used for encryption is a mirror image of the key used for decryption
B)the same key is used for encryption and decryption
C)the key used for encryption is independent of the key used for decryption
D)None of the above
A)the key used for encryption is a mirror image of the key used for decryption
B)the same key is used for encryption and decryption
C)the key used for encryption is independent of the key used for decryption
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Threats are _____.
A)weaknesses in an information system that can be exploited to compromise information security
B)capabilities,intentions and methods of adversaries to compromise information security
C)measures taken to mitigate the dangers from information security threats
D)restrictions on information to protect personal privacy
A)weaknesses in an information system that can be exploited to compromise information security
B)capabilities,intentions and methods of adversaries to compromise information security
C)measures taken to mitigate the dangers from information security threats
D)restrictions on information to protect personal privacy
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Network security _____.
A)protects information against dangers created by network connectivity
B)protects network hardware against dangers created by network connectivity
C)protects end users against dangers created by network connectivity
D)None of the above
A)protects information against dangers created by network connectivity
B)protects network hardware against dangers created by network connectivity
C)protects end users against dangers created by network connectivity
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The limitations of firewalls include all the following except _____.
A)it is ineffective if an internal computer is compromised
B)it cannot protect services accessible from the Internet
C)it can block traffic from any identified host or network
D)its effectiveness depends upon the abilities of the administrator
A)it is ineffective if an internal computer is compromised
B)it cannot protect services accessible from the Internet
C)it can block traffic from any identified host or network
D)its effectiveness depends upon the abilities of the administrator
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Authorization is _____.
A)hiding information
B)providing an alternate identity
C)the verification of a claimed identity
D)granting certain specific privileges over information to a user
A)hiding information
B)providing an alternate identity
C)the verification of a claimed identity
D)granting certain specific privileges over information to a user
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
In the context of network security,the de-militarized zone _____.
A)is most useful in military networks
B)contains the organization's external services such as web and email servers
C)contains the organization's sensitive data
D)None of the above
A)is most useful in military networks
B)contains the organization's external services such as web and email servers
C)contains the organization's sensitive data
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
In the context of network security,patching _____.
A)applies cosmetic changes to software
B)updates software to fix known software bugs
C)improves the look and feel of software
D)adds user friendly features to software
A)applies cosmetic changes to software
B)updates software to fix known software bugs
C)improves the look and feel of software
D)adds user friendly features to software
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
The most popular implementation of asymmetric key encryption is _____.
A)Data Encryption Standard DES)
B)International Data Encryption Algorithm IDEA)
C)Advanced Encryption Standard AES)
D)Rivest,Shamir and Alderman RSA)
A)Data Encryption Standard DES)
B)International Data Encryption Algorithm IDEA)
C)Advanced Encryption Standard AES)
D)Rivest,Shamir and Alderman RSA)
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Information security is defined as _____.
A)providing confidentiality,integrity and availability to information
B)encrypting information
C)hiding information
D)providing robust data storage of information
A)providing confidentiality,integrity and availability to information
B)encrypting information
C)hiding information
D)providing robust data storage of information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
A mobile worker requires secure access to corporate business applications from his hotel room.The most suitable encryption technology for this purpose is _____.
A)Virtual Private Network VPN)
B)Transport Layer Security TLS)
C)Secure Shell SSH)
D)Digital Signature
A)Virtual Private Network VPN)
B)Transport Layer Security TLS)
C)Secure Shell SSH)
D)Digital Signature
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
The most common control used to ensure availability of outgoing information is _____.
A)firewall
B)redundancy
C)encryption
D)de-militarized zone
A)firewall
B)redundancy
C)encryption
D)de-militarized zone
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
An organization maintains multiple network connections to the Internet.This is an example of _____.
A)encryption
B)patching
C)modulation
D)redundancy
A)encryption
B)patching
C)modulation
D)redundancy
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Most commercial encryption technologies such as SSL and VPN _____.
A)combine the best features of symmetric and asymmetric key encryption
B)use only symmetric key encryption
C)use only asymmetric key encryption
D)allow the user to choose whether to use symmetric or asymmetric key encryption
A)combine the best features of symmetric and asymmetric key encryption
B)use only symmetric key encryption
C)use only asymmetric key encryption
D)allow the user to choose whether to use symmetric or asymmetric key encryption
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Redundancy is _____.
A)scheduling periodic maintenance to improve availability
B)hiding information to provide confidentiality
C)the provision of surplus service capacity to improve availability
D)None of the above
A)scheduling periodic maintenance to improve availability
B)hiding information to provide confidentiality
C)the provision of surplus service capacity to improve availability
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck