3.1.16 - Evaluate the advantages and disadvantages of each method of network security. Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

State 2 advantages of userID as a method of network security.

A

1) Access rights to the network can be set for each user.
2) User groups can be created to manage user rights in batches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State 4 disadvantages of userID as a method of network security.

A

1) A User ID can be stolen.
2) System can be bypassed by reading the chip.
3) Does not protect against intercepting messages in the network.
4) Does not protect against insider attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State 2 advantages of encryption as a method of network security.

A

1) Strong encryption is very hard to break.
2) Computers are fast enough to decrypt in real time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State 3 disadvantages of encryption as a method of network security.

A

1) Users are often lazy and use a password that is easy to guess.
2) The password needs to be transmitted over the network to the receiver to allow them to read the message.
3) Some encryptions have backdoors built in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State 3 advantages of firewalls as a method of network security.

A

1) Provides a way to monitor and control network traffic between the network and the internet.
2) Can be used to block unauthorised access to the network, prevent malware and virus attacks, and protect sensitive data.
3) Can be configured to allow or block traffic based on various criteria such as IP address, port and protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State 3 disadvantages of firewalls as a method of network security.

A

1) Can be expensive to implement, particularly for large networks.
2) Can increase latency and reduce network performance.
3) Must be configured and maintained carefully to ensure that they do not block legitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly