Deck 9: Introduction to Network Security

Full screen (f)
exit full mode
Question
Which facet of securing access to network data makes data unusable to anyone except authorized users?

A) encryption
B) authentication
C) malware protection
D) security devices
Use Space or
up arrow
down arrow
to flip the card.
Question
A Trojan horse is a self-replicating program that masks itself as a useful program but is actually a type of malware.
Question
When using BitLocker to encrypt your entire disk,which mode must you use if your system is not configured for TPM support?

A) transport mode
B) USB key mode
C) user authentication mode
D) encryption mode
Question
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?

A) rootkit
B) Trojan
C) hoax virus
D) spyware
Question
What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?

A) intrusion detection
B) MAC filtering
C) content filter
D) stateful packet inspection
Question
A DoS attack ties up network bandwidth or services,rendering resources useless to legitimate users.
Question
Where should a NIDS be placed to protect the entire network?

A) datacenter
B) intermediate distribution frame
C) demilitarized zone
D) internal LAN
Question
Which of the following is NOT a guideline of a security policy?

A) easy for users to understand
B) should be enforceable
C) uses legal terminology to protect the organization
D) clearly state the policy objectives
Question
Which of the following is a protocol that centralizes authentication,authorization,and accounting?

A) Kerberos
B) mutual authentication
C) EAP
D) RADIUS
Question
What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?

A) frame
B) EFS
C) tunnel
D) access point
Question
What type of policy defines the methods involved when a user logs on to the network?

A) audit
B) security
C) authentication
D) acceptable use
Question
Which protocol is used to encrypt data as it travels a network?

A) EFS
B) Kerberos
C) IPsec
D) SMB
Question
A security policy should clearly state the desired rules,even if they cannot be enforced.
Question
If the minimum password length on a Windows system is set to zero,what does that mean?

A) The user never has to change the password.
B) The user can use a blank password.
C) The user has to change the password every day.
D) The user account is disabled.
Question
What process,available on most routers,will help improve security by masking the internal IP address of the transmitting device?

A) IPSec
B) NAT
C) EFS
D) VPN
Question
What type of device should you install as a decoy to lure potential attackers?

A) honeypot
B) Trojan
C) IPS
D) VPN
Question
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

A) Kerberos authentication
B) digital certificate
C) GNU privacy guard
D) preshared key
Question
Physically securing your switches isn't necessary because users will not know how to access them.
Question
Which VPN implementation needs no additional configuration to be allowed access through a firewall?

A) SSTP
B) IPSec
C) PPTP
D) L2TP
Question
You don't need to physically secure your servers as long as you use a good strong password for your accounts.
Question
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
monopolizes network services or network bandwidth
Question
_____________ procedures for all data that can't be reproduced easily should be in place,and a disaster recovery procedure must be devised and carried out.
Question
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?

A) packet storm
B) broadcast flood
C) smurf attack
D) half-open SYN attack
Question
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
time-dependent malware that can come in different forms.Its main characteristic is that it's activated when a particular event occurs
Question
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
used to discover breaches in security
Question
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
spreads by replicating itself into programs or documents
Question
Firewall rules can be based on which of the following properties? (Choose all that apply.)

A) source IP address
B) destination MAC address
C) protocol
D) context
E) operating system
Question
____________ authentication means the identity of both parties is verified.
Question
____________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
Question
Removal of ______________ is very difficult because they alter system files and drivers the system depends on to run.
Question
How the network resources are to be used should be clearly defined in a (an)____________ policy.
Question
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
Question
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
a series of letters,numbers,and special characters,much like a password,that both communicating devices use to authenticate each other's identity
Question
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
packets are denied on context as well as packet properties
Question
Which of the following can be used to secure data on disk drives? (Choose all that apply.)

A) EFS
B) VPN
C) IPSec
D) BitLocker
E) TrueCrypt
Question
Which of the following is a tool used to determine what possible points of entry exist that are open and vulnerable on your system?

A) port scanner
B) protocol finder
C) ping scanner
D) trace route
Question
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge.It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.

A) rootkit
B) Trojan
C) hoax virus
D) spyware
Question
Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)

A) authority
B) knowledge
C) rank
D) possession
E) inherence
Question
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
inspects packets as they go into and out of the network
Question
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
permits access to computer,bypasses normal authentication
Question
a self-contained,self-replicating program
Question
Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.
Question
What is a penetration tester?
Question
What are the two VPN modes that are available with most VPN servers?
Question
What are the complexity requirements for a Windows password? List the four characteristics.
Question
What is the difference between a virus and a worm?
Question
Briefly describe three of the seven elements of a network security policy.
Question
What is a VPN?
Question
What is a network security policy?
Question
What is an IDS?
Question
How should a room that is going to house your servers be equipped?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/51
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Introduction to Network Security
1
Which facet of securing access to network data makes data unusable to anyone except authorized users?

A) encryption
B) authentication
C) malware protection
D) security devices
A
2
A Trojan horse is a self-replicating program that masks itself as a useful program but is actually a type of malware.
False
3
When using BitLocker to encrypt your entire disk,which mode must you use if your system is not configured for TPM support?

A) transport mode
B) USB key mode
C) user authentication mode
D) encryption mode
B
4
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?

A) rootkit
B) Trojan
C) hoax virus
D) spyware
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
5
What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?

A) intrusion detection
B) MAC filtering
C) content filter
D) stateful packet inspection
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
6
A DoS attack ties up network bandwidth or services,rendering resources useless to legitimate users.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
7
Where should a NIDS be placed to protect the entire network?

A) datacenter
B) intermediate distribution frame
C) demilitarized zone
D) internal LAN
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is NOT a guideline of a security policy?

A) easy for users to understand
B) should be enforceable
C) uses legal terminology to protect the organization
D) clearly state the policy objectives
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is a protocol that centralizes authentication,authorization,and accounting?

A) Kerberos
B) mutual authentication
C) EAP
D) RADIUS
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
10
What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?

A) frame
B) EFS
C) tunnel
D) access point
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
11
What type of policy defines the methods involved when a user logs on to the network?

A) audit
B) security
C) authentication
D) acceptable use
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
12
Which protocol is used to encrypt data as it travels a network?

A) EFS
B) Kerberos
C) IPsec
D) SMB
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
13
A security policy should clearly state the desired rules,even if they cannot be enforced.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
14
If the minimum password length on a Windows system is set to zero,what does that mean?

A) The user never has to change the password.
B) The user can use a blank password.
C) The user has to change the password every day.
D) The user account is disabled.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
15
What process,available on most routers,will help improve security by masking the internal IP address of the transmitting device?

A) IPSec
B) NAT
C) EFS
D) VPN
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
16
What type of device should you install as a decoy to lure potential attackers?

A) honeypot
B) Trojan
C) IPS
D) VPN
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
17
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

A) Kerberos authentication
B) digital certificate
C) GNU privacy guard
D) preshared key
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
18
Physically securing your switches isn't necessary because users will not know how to access them.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
19
Which VPN implementation needs no additional configuration to be allowed access through a firewall?

A) SSTP
B) IPSec
C) PPTP
D) L2TP
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
20
You don't need to physically secure your servers as long as you use a good strong password for your accounts.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
monopolizes network services or network bandwidth
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
22
_____________ procedures for all data that can't be reproduced easily should be in place,and a disaster recovery procedure must be devised and carried out.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?

A) packet storm
B) broadcast flood
C) smurf attack
D) half-open SYN attack
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
time-dependent malware that can come in different forms.Its main characteristic is that it's activated when a particular event occurs
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
25
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
used to discover breaches in security
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
26
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
spreads by replicating itself into programs or documents
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
27
Firewall rules can be based on which of the following properties? (Choose all that apply.)

A) source IP address
B) destination MAC address
C) protocol
D) context
E) operating system
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
28
____________ authentication means the identity of both parties is verified.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
29
____________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
30
Removal of ______________ is very difficult because they alter system files and drivers the system depends on to run.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
31
How the network resources are to be used should be clearly defined in a (an)____________ policy.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
32
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
33
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
a series of letters,numbers,and special characters,much like a password,that both communicating devices use to authenticate each other's identity
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
packets are denied on context as well as packet properties
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following can be used to secure data on disk drives? (Choose all that apply.)

A) EFS
B) VPN
C) IPSec
D) BitLocker
E) TrueCrypt
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is a tool used to determine what possible points of entry exist that are open and vulnerable on your system?

A) port scanner
B) protocol finder
C) ping scanner
D) trace route
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge.It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.

A) rootkit
B) Trojan
C) hoax virus
D) spyware
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)

A) authority
B) knowledge
C) rank
D) possession
E) inherence
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
inspects packets as they go into and out of the network
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
40
Match each item with a statement below:

a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
permits access to computer,bypasses normal authentication
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
41
a self-contained,self-replicating program
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
43
What is a penetration tester?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
44
What are the two VPN modes that are available with most VPN servers?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
45
What are the complexity requirements for a Windows password? List the four characteristics.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
46
What is the difference between a virus and a worm?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
47
Briefly describe three of the seven elements of a network security policy.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
48
What is a VPN?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
49
What is a network security policy?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
50
What is an IDS?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
51
How should a room that is going to house your servers be equipped?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 51 flashcards in this deck.