CH 9 Flashcards

1
Q
Which of the following passwords is
best to use on a system containing highly
sensitive information?
a. BillySmith
b. 0OxqH}ml2-wO
c. H@ckAt!ack23
d. MySecretPassword
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
How do VPNs accomplish the
“private” part of a virtual private
network?
a. Tunneling
b. Concentrating
c. Encapsulating
d. Authenticating
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following terms refers
to attacking a Web server by forcing it to
respond to a flood of ping packets so
that the server can’t respond to normal
traffic?
a. DDR
b. ICMP
c. DoS
d. Worm
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is a guideline
for creating a security policy?
a. A security policy should be cryptic so
that attackers can’t understand it.
b. A security policy should be general
enough so that rules can be added as
needed.
c. A security policy should be
enforceable.
d. A security policy should have
different provisions depending on the
user.
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following questions
must be answered before determining
what level of security a network
requires? (Choose all that apply.)
a. What tools are used to attack the
network?
b. What’s being protected?
c. From whom should data be
protected?
d. How much data is on the network?
A

B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following should be a
common element in any level of security
policy? (Choose all that apply.)
a. Complex passwords
b. Backup procedures
c. Data encryption
d. Virus protection
A

B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which phrase from the following list
best completes this sentence? If there’s
access to the equipment, there’s no
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
a. physical security
b. network monitoring
c. data integrity
d. security policy
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following is a
requirement for rooms housing network
servers?
a. Separate heating system
b. Adequate cooling
c. False ceilings
d. Shared electrical circuit
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which procedure specifies what
resources users can access and the tasks
they can perform on a network?
a. Authentication
b. Auditing
c. Authorization
d. Logon
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
If you want to allow a blank password
on a Windows computer, which of the
following do you set the password
minimum length to?
a. Blank
b. 0
c. -1
d. Nothing
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
.If you want to prevent password
guessing to foil intruders, you should
enable which of the following?
a. Account lockout
b. Password expiration
c. Password disabling
d. Account policies
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which authentication protocol is
used in a Windows domain
environment?
a. AES
b. Kerberos
c. EAP
d. MS-CHAP v2
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
To encrypt data stored on a hard
drive on a Windows Server computer,
you should use which of the following?
a. EFS
b. AES
c. NTFS
d. PAP
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
If network administrators want to be
informed when an attempt has been
made to compromise the network, what
should they use?
a. VPN
b. AES
c. IDS
d. EFS
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which VPN mode should you use if
you want to establish a secure tunnel
between a main office and a branch
office?
a. Client-to-gateway
b. Site-to-site
c. Site to gateway
d. Host to site
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
What device should you consider
installing if you want countermeasures
to take place when an attack is
detected?
a. Content filter
b. IPS
c. Antivirus software
d. HIDS