Lesson 11 Flashcards

1
Q

The operating system’s role in the protection of the system from physical threats involves:

A

providing tools to enable system backups and restoration of the OS itself, files, programs and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The two types of OS backups are:

A

File backups and system image backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer security is:

A

the maintenance of system integrity, availability and confidentiality at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The operating system uses _____ to ensure users have authorized access to the computer system.

A

The OS uses authentication to ensure that a user accessing a program is authorized or legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A program which stands as a barrier between a computer system and external traffic is known as _____.

A

a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which software is used to process instructions and coordinate between devices?

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which system resource is most likely to use IRQ?

A

The hardware will get the CPU’s attention using IRQ. (‘hey, there’s something new here’)
answer: hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following would be the most appropriate description of how DMA is used?

A

DMA channels allow connection between hardware device and memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is software that enables you to perform a specific function?

A

An application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have inserted the USB cable for an external hard drive. Which of the following most describes the process or tool that allows the device to be recognized and usable by the operating system?

A

PnP
PnP, or plug-and-play, ensures that devices can be plugged in and used/identified by the OS. Behind the scenes, the OS communicates with the hardware, using software to identify the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An OS security policy is one that outlines the processes of ensuring that the system maintains a certain level of _____, _____ and _____.

A

integrity, confidentiality, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When implementing OS security policies and procedures, how often should organizations review them?

A

Organizations should review their OS security policies and procedures quarterly or annually. When there are any minor or major changes in the organization’s assets, infrastructure or networks, all policies and procedures should be updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which policy includes both the incident response policy and the disaster recovery plan?

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which policy informs users on how to handle an organization’s confidential or sensitive information?

A

The main objective of the information security policy is to inform users that there are guidelines that they will be held accountable for while handling sensitive data for the organization. These policies can be broken down into areas such as how employees uses IT assets, how they use the network, and rules about internet usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statement below is not a subject that would be included in an Access Control Policy (ACP)?

A

Installing a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?

A

Data loss prevention (DLP) uses pattern recognition to prevent sensitive data from leaving the corporate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If you are using administrative policies to enhance your network security, which of the following would you NOT be doing?

A

Scanning emails for viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following are NOT a method to deliver network security?

A

Over the telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When can a network security hardware appliance stop threats on the network?

A

When it is installed in line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A multi-layered approach to network security is best because _____.

A

Different types of network security systems focus on different threats and vulnerabilities

21
Q

Live threat-intelligence helps the firewall to identify and stop _____.

A

Threats that the firewall may have never seen before.

22
Q

A firewall can be used to direct and control traffic _____.

A

both coming in and going out of your network

23
Q

What type of firewall can stop more advanced threats, such as tricks devised by hackers to bypass the firewall’s access policy protection?

A

The next-generation firewall is the latest type of firewall (as of 2016) that can stop the most advanced and evasive threats.

24
Q

What is the maximum number of zones that can be associated to a firewall?

A

Firewalls can potentially have many of zones associated with them. Simple networks usually have between two and four zones. More complex networks can have hundreds of zones. The more zones that are managed by the firewall, the more complex and enterprise-grade your firewall is likely to be.

25
Q

Which of the following is the purpose of a firewall access policy?

A

It provides a set of rules that determine who gets in or out of your network and who doesn’t.

26
Q

What is a VPN?

A

A network that is only accessible with the correct credentials

27
Q

What is required for a VPN to function correctly?

A

Encryption and authentication protocols

28
Q

What are two types of VPNs?

A

Site-to-site and remote access

29
Q

What are some of the tunneling protocols that VPNs use?

A

IPsec and L2TP

30
Q

What service does a VPN solution provide?

A

Remote access to private network resources

31
Q

A network security policy:

A

All of these answers are correct

A network security policy defines what needs protecting, includes rules for end users, and management’s objectives for security.

32
Q

A/An _____ specifies proper utilization of company computer resources and how to protect private information.

A

An acceptable usage policy (AUP) covers proper utilization of company computer resources and how to protect private information.

33
Q

Two of the first steps in developing a network security policy are:

A

Deciding what assets need protecting and assessing potential vulnerabilities

34
Q

An example of an internal network security threat is:

A

All of these answers are correct

Internal security threats can include accidental damage, employee theft, and employee misuse.

35
Q

The network security policy is a living document because:

A

Assets and threats change over time

36
Q

Which of these is an example of the Internet of Things?

A

A vehicle that can receive updates wirelessly.

37
Q

What is the purpose of the Internet of Things?

A

To create connections between devices, human and data.

38
Q

What is the Internet of Things?

A

The connection of everyday devices to the Internet.

The Internet of Things is the connection of everyday devices, like light bulbs and thermostats, to the Internet.

39
Q

This component of the Internet of Things concerns the networking and technology that keeps the Internet of Things functioning.

A

The infrastructure of the Internet of Things is important for developing ties between devices, humans and data, and making sure the Internet of Things operates effectively.

40
Q

Amazon Go’s grocery store experience without checkout lines is an example of what component of the Internet of Things?

A

Processes

41
Q

How has the Internet of Things prompted new concerns over security issues?

A

Devices are not compatible with traditional security measures.

The increase in IoT devices has prompted new concerns over security issues since older methods of security protocols are typically not compatible with new gadgets.

42
Q

IoT devices create more significant security challenges for networks due to all of these concerns EXCEPT which?

A

They produce an event log.

IoT devices create significant security challenges for networks because they are always on and connected and do not typically issue security alerts if a breach or hack has occurred.

43
Q

Ralph went to the home improvement store and purchased a new smart lock for his home. Which of these common challenges with IoT devices today may Ralph face with his new device?

A

Mass production concerns.

The mass production of IoT devices, like smart locks, makes it possible for hackers to breach all devices once they’ve breached a single device.

44
Q

A common security concern among organization-owned IoT devices is _____.

A

Employees accessing them outside network security.

The protection potentially offered in an organization’s network goes away when an employee utilizes an IoT device either in a public setting or at their home, causing the potential for network intrusions.

45
Q

Commonly performed on traditional devices such as computers, _____ are frequently not capable on IoT devices due to memory or unique operating systems.

A

Security Updates.

Updates, while common on more traditional internet-enabled devices such as computers, are frequently not an option on IoT devices due to memory issues or unique operating systems that won’t support them.

46
Q

A/An _____ specifies proper utilization of company computer resources and how to protect private information.

A

Acceptable Usage policy

47
Q

Besides a direct attack on a network by a hacker, which security threat below is the next most worrisome

A

Virus

A virus is the most worrisome because the code is downloaded onto your computer and eventually to your network without your knowledge. Once a virus is installed and activated it replicates itself very quickly and saturates the network. Viruses can be destructive and render a computer or network useless until it is removed.

48
Q

According to network security engineers and other experts in the security field, the likelihood of eliminating all security threats is _____.

A

Not likely

49
Q

Areas of weakness
Network security threats: types and vulnerabilities
what is a network security policy: procedures and examples

A