Lesson 12 Flashcards

1
Q

5
One example of network security is the usage of passwords to protect individual accounts and information. What common sense password rule is often ignored in this case?

  • Making a password too short.
  • Making a password hard to guess and not using easy things such as a pet name or a family member’s birthday.
  • Writing the password down and leaving it in the open.
  • Making the password completely unique, not simply recycling the same password with a simple change.
A

Writing the password down and leaving it in the open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What legal and regulatory system governs the way data is handled in a medical office?
HIPAA
ATM

PCI
FERPA

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the case of webcam hacking mentioned in the lesson, the term spyware was used. What is spyware?
Viral software that destroys a computer.
Software that allows the access of data from a computer without the person’s knowledge.

Software that creates popups.
Software used by spies.

A

Software that allows the access of data from a computer without the person’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A good administrator _____ the needs of security in the organization and the capabilities of the employees in the organization.
talks about
balances

considers
ignores

A

balances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What organization sets the rules as to how credit card data is handled?
PCI
HIPAA

FDIC
ATM

A

PCI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Public and private _____ can help verify identity in transmitting a document between two parties.

Keys

Addresses

Profiles

Emails

A

keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To repudiate means to do what?

To enhance your security efforts

To breach network security

To deny or contest something

To start something over

A

To deny or contest something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The use of _____ might include a fingerprint scan to complete a bank transaction via a mobile application.

Physical signatures

Biometrics

Timestamps

Public keys

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Non-repudiation means putting measures in place to assure something cannot be denied. Which of these is a simplified method of non-repudiation?

Sending a link via social media

Delivering a document to a home address

Attaching a document to an email

Sending a letter through certified mail

A

Sending a letter through certified mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by network security?

A security team hired to protect your office equipment

Entering your password on a social networking site

Protection of electronic data and computer systems

Securing your workplace computer at night

A

Protection of electronic data and computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WPA2 Enterprise uses a _____ server for logins.

Active Directory.
RADIUS.

Kerberos.
Microsoft Access.

A

RADIUS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does WPA stand for?
Wi-Fi Protocol Adapter.
Wireless Protocol Administration.

Wireless Protection Advanced.
Wi-Fi Protected Access.

A

Wi-Fi Protected Access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What advantage does WPA2 have over WPA?
WPA2 uses the AES encryption standard.
WPA2 is open source.

WPA2 is faster.
WPA2 is widely supported.

A

WPA2 uses the AES encryption standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why did the first version of WPA use TKIP?
TKIP was cheaper.
Many old devices still used WEP and TKIP was intended to make it easy to upgrade.

TKIP had a catchy name.
TKIP was fast.

A

Many old devices still used WEP and TKIP was intended to make it easy to upgrade.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why was WEP deprecated in favor of WPA?

WEP was too slow.

WEP was insecure.

WEP was full of bugs.

WEP didn’t work on the Mac.

A

WEP was insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless technology was created to eliminate cables, yet provide _____.

additional features

a similar set of features

an identical set of features

most of the features

A

an identical set of features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WEP stands for _____.

Wireless Extra Privacy

Wired Engineer Privacy

Wireless Equivalent Privacy

Wired Equivalent Privacy

A

Wired Equivalent Privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security in a network ensures all of the following about the information that is passed around EXCEPT:

usability

safety

integrity

affordability

A

affordability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WEP affects _____ in a network.
computers
printers

wireless connections
wired connections

A

wireless connections

20
Q

WEP is part of the _____ standard.
802.11
802.11c

802.11b
802.11a

A

802.11b

21
Q

When are guest accounts most likely necessary?
a doctor’s office in the waiting room
a doctor’s office in the consultation office

a doctor’s office in the patient’s exam rooms
a doctor’s office in the lab

A

a doctor’s office in the waiting room

22
Q

Which of these best describes the process of encryption?
only letting certain devices on
password protection

breaking something into a million pieces and reassembling it
using a secret code

A

using a secret code

23
Q

Which of these would most likely benefit from registering its MAC addresses.

a busy hospital

a school

a large department store’s guest account

a small investment firm

A

a small investment firm

24
Q

Which of these represents the strongest defense of a wireless network?
WPA2 with Guest Accounts
WEP with Guest accounts

WEP with MAC registration
WPA2 with MAC registration

A

WPA2 with MAC registration

25
Q

Which describes the best attitude about network names?
Only use numbers for network names.
Never mention either the router name or the tech company that built it.

Always mention the tech company that built the router in the name of the network.
Always mention the router name.

A

Never mention either the router name or the tech company that built it.

26
Q

Which of these best describes the Stuxnet virus?

Low-level threat

Non-issue

Passive threat

Active threat

A

Active threat

27
Q

A spy keeping track of communications between two heads of state would likely use which of these?

Denial of Service

Sniffer

Data manipulation

Man in the middle

A

Man in the middle

28
Q

Which of these is a type of attack that can start off as passive then turn active?

Sniffer

Man in the Middle

Denial of Service

Data modification

A

Sniffer

29
Q

Which of these floods a server with requests?

Sniffer

Denial of Service

Man in the middle

Data manipulation

A

Denial of service

30
Q

What is a data modification attack?

When information is intercepted and changed

When a worm is put on a computer

When information is intercepted

When anti-virus software finds a virus

A

When information is intercepted and changed

31
Q

Which type of computer attack is considered a distributed attack?
DoSS
DRoS

DDoS
DoS

A

DDoS

32
Q

Which of these options properly defines both a DoS and a DDoS attack?

Organized electronic impulses

Organized electronic incursions

Establishment of organized limits

Arbitrarily-set login restrictions

A

Organized electronic incursions

33
Q

Which of these options contains the three basic target categories for a DoS or a DDoS?

Systems, memory, and network access card

Resources, printers, and storage devices

Network access card, applications, and peripheral devices

Networks, systems, and applications

A

Networks, systems, and applications

34
Q

Which of these options contains a primary objective of a DoS or DDoS attack?

Consume as much bandwidth as possible

Destroy access memory

Blank the screen to deny input

Lock out the computer’s keypad entry

A

Consume as much bandwidth as possible

35
Q

Which of these answers describes one possible method to prevent or limit the impacts of a DoS or DDoS?

Disable the firewall

Install network interface software

Install and maintain anti-virus (AV) software

Install new application software

A

Install and maintain anti-virus (AV) software

36
Q

Which type of computer attack is considered a distributed attack?
Report an Error

DoSS
DDoS
DRoS
DoS

A

DDos

37
Q

What is the maximum number of zones that can be associated to a firewall?
Report an Error

Four
Two
One
Firewalls can have many zones associated to them.

A

Firewalls can have many zones associated to them.

38
Q

What type of firewall can stop more advanced threats, such as tricks devised by hackers to bypass the firewall’s access policy protection?
Report an Error

A next-generation firewall
A standard firewall will block all threats and tricks
An intelligent firewall
A stateful inspection firewall

A

A next-generation firewall

39
Q

Which word below best describes a flaw in network security which permits an assault on network resources.
Report an Error

Instability
Vulnerability
Unreliability
Incompatibility

A

Vulnerability

40
Q

Which of the following is NOT an element of access in regards to network security?
Report an Error

Authorization

Accounting

Authentication

Availability

A

Availability

41
Q

Intrusion detection systems provide what function in network security?
Report an Error

Provide retina scanning at the computer room door
Scramble data so outsiders can’t make use of it
Provide badge-access only to the building
Intrusion detection systems provide what function in network security?
Report an Error

Provide retina scanning at the computer room door
Scramble data so outsiders can’t make use of it
Provide badge-access only to the building
Alert network administrators to a breach and detect unusual activity within a network

A

Intrusion detection systems provide what function in network security?
Report an Error

Provide retina scanning at the computer room door
Scramble data so outsiders can’t make use of it
Provide badge-access only to the building
Alert network administrators to a breach and detect unusual activity within a network

42
Q

Which of the following is an unintentional threat to the security of computer networks?

Computer viruses

Theft of Data

Denial of Service (DoS) attacks

Computer failures

Sabotage

A

Computer failures

43
Q

Which of the following is a method for securing data by using special mathematical algorithms to convert the data into a scrambled code before transmission?

Algebra

Encryption

Firewall

Anti-Virus Software

Coding

A

Encryption

44
Q

Which is the oldest, least secure method of wireless security?
Report an Error

TKIP
WPA2
WPA
WEP

A

WEP

45
Q

A multi-layered approach to network security is best because _____.

It uses less resources in your datacenter.
Some brands are better than others.
Different types of network security systems focus on different threats and vulnerabilities
It costs less the other approaches.

A

Different types of network security systems focus on different threats and vulnerabilities

46
Q

Which of the following are NOT a method to deliver network security?
Report an Error

Hardware appliance
Software
Over the telephone
Cloud service

A

Over the telephone