CH 9 Flashcards
1
Q
Which of the following passwords is best to use on a system containing highly sensitive information? a. BillySmith b. 0OxqH}ml2-wO c. H@ckAt!ack23 d. MySecretPassword
A
C
2
Q
How do VPNs accomplish the “private” part of a virtual private network? a. Tunneling b. Concentrating c. Encapsulating d. Authenticating
A
A
3
Q
Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets so that the server can’t respond to normal traffic? a. DDR b. ICMP c. DoS d. Worm
A
C
4
Q
Which of the following is a guideline for creating a security policy? a. A security policy should be cryptic so that attackers can’t understand it. b. A security policy should be general enough so that rules can be added as needed. c. A security policy should be enforceable. d. A security policy should have different provisions depending on the user.
A
C
5
Q
Which of the following questions must be answered before determining what level of security a network requires? (Choose all that apply.) a. What tools are used to attack the network? b. What’s being protected? c. From whom should data be protected? d. How much data is on the network?
A
B, C
6
Q
Which of the following should be a common element in any level of security policy? (Choose all that apply.) a. Complex passwords b. Backup procedures c. Data encryption d. Virus protection
A
B, C
7
Q
Which phrase from the following list best completes this sentence? If there’s access to the equipment, there’s no \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_. a. physical security b. network monitoring c. data integrity d. security policy
A
A
8
Q
Which of the following is a requirement for rooms housing network servers? a. Separate heating system b. Adequate cooling c. False ceilings d. Shared electrical circuit
A
B
9
Q
Which procedure specifies what resources users can access and the tasks they can perform on a network? a. Authentication b. Auditing c. Authorization d. Logon
A
C
10
Q
If you want to allow a blank password on a Windows computer, which of the following do you set the password minimum length to? a. Blank b. 0 c. -1 d. Nothing
A
B
11
Q
.If you want to prevent password guessing to foil intruders, you should enable which of the following? a. Account lockout b. Password expiration c. Password disabling d. Account policies
A
A
12
Q
Which authentication protocol is used in a Windows domain environment? a. AES b. Kerberos c. EAP d. MS-CHAP v2
A
B
13
Q
To encrypt data stored on a hard drive on a Windows Server computer, you should use which of the following? a. EFS b. AES c. NTFS d. PAP
A
A
14
Q
If network administrators want to be informed when an attempt has been made to compromise the network, what should they use? a. VPN b. AES c. IDS d. EFS
A
C
15
Q
Which VPN mode should you use if you want to establish a secure tunnel between a main office and a branch office? a. Client-to-gateway b. Site-to-site c. Site to gateway d. Host to site
A
B
16
Q
What device should you consider installing if you want countermeasures to take place when an attack is detected? a. Content filter b. IPS c. Antivirus software d. HIDS
A
B