Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Network+ Guide to Networks Study Set 1
Exam 12: Network Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Short Answer
MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -A firewall that can block designated types of traffic based on application data contained within packets.
Question 2
True/False
Encryption is the last means of defense against data theft.
Question 3
Essay
Describe an advantage of using EAP.
Question 4
Multiple Choice
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
Question 5
Multiple Choice
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
Question 6
Short Answer
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
Question 7
Essay
Describe the two phases IPSec use to accomplish authentication.
Question 8
Short Answer
A(n)____________________ identifies an organization's security risks,levels of authority,designated security coordinator and team members,responsibilities for each team member,and responsibilities for each employee.
Question 9
Short Answer
MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -A software application on a network host that acts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic.
Question 10
True/False
By default,the 802.11 standard offers substantial security.
Question 11
Multiple Choice
A(n) ____ is a password-protected and encrypted file that holds an individual's identification information,including a public key.
Question 12
Short Answer
MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -A firewall that protects only the computer on which it is installed.
Question 13
True/False
Human errors,ignorance,and omissions cause more than half of all security breaches sustained by networks.
Question 14
Multiple Choice
____ protocols are the rules that computers follow to accomplish authentication.
Question 15
Essay
Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.
Question 16
Essay
Describe who should conduct a security audit and advantages,if any.
Question 17
Multiple Choice
____ is a method of encrypting TCP/IP transmissions.
Question 18
Short Answer
In general,information is ____________________ if it could be used by other parties to impair an organization's functioning,decrease customers' confidence,cause a financial loss,damage an organization's status,or give a significant advantage to a competitor.