Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Data Communications and Networking Study Set 1
Exam 11: Network Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Triple DES uses a total of 512 bits as the key.
Question 2
True/False
Macro viruses can spread when an infected file is opened.
Question 3
Multiple Choice
A fundamental technique to determine if an intrusion is in progress in a stable network is:
Question 4
Multiple Choice
A security hole is an) :
Question 5
True/False
A patch is a software solution to correct a security hole
Question 6
Essay
Using a chart format, describe 8 possible threats to a data network such as hardware, software, files, circuits, internal personnel, physical security, external people, and users).Describe 8 possible solutions to these conceivable threats.
Question 7
Essay
Describe the three main reasons why there has been an increase in computer security over the past few years.
Question 8
Multiple Choice
According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they
Question 9
Multiple Choice
_________ controls stop a person from acting.
Question 10
Multiple Choice
For Ethernet networks, a _______ switch can make eavesdropping more difficult.
Question 11
Multiple Choice
The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as:
Question 12
Essay
Describe five biometric technologies.How can a biometric enhance security in a network? What are some of the advantages and disadvantages of biometrics?
Question 13
Multiple Choice
An example of _____ of data would be if a computer virus eliminated files on that computer.
Question 14
Essay
What is the difference between a network-based IPS, host-based IPS and application-based IPS?
Question 15
True/False
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
Question 16
Multiple Choice
A tornado that eliminates a network control center would be an example of a natural __________
Question 17
True/False
The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.