Chapter 11 quiz Flashcards
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
True
False
True
Network security is more often compromised “from the inside” than from external sources.
True
False
True
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
True
False
False
Encryption is the last means of defense against data theft.
True
False
True
By default, the 802.11 standard offers substantial security.
True
False
False
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Cracking
Hacking
War driving
Phishing
Phishing
In a ____ attack, a person redirects or captures secure transmissions as they occur.
denial-of service
man-in-the-middle
war driving
phishing
man-in-the-middle
____ software searches a node for open ports.
Phishing
Sniffing
Authentication
Port scanner
Port scanner
A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.
people
transmission and hardware
protocols and software
Internet access
transmission and hardware
A NOS that contains a “back door”is an example of a risk associated with ____.
people
transmission and hardware
protocols and software
Internet access
protocols and software
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
flashing
denial-of-service
war driving
phishing
flashing
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
flashing
denial-of-service
war driving
phishing
denial-of-service
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
switch’s
gateway’s
router’s
proxy server’s
router’s
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
packet-filtering
gateway
proxy
selective
packet-filtering
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
flashing
denial-of-service
dictionary
brute force
dictionary
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
flashing
denial-of-service
dictionary
brute force
brute force
The combination of a public key and a private key is known as a ____.
key lock
key frame
key pair
key set
key pair
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
digital certificate
authentication file
access control list
authentication certificate
digital certificate
The use of certificate authorities to associate public keys with certain users is known as ____.
PGP
PKI
IPSec
SSL
PKI
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
PGP
SSH
IPSec
SSL
PGP
____ is a method of encrypting TCP/IP transmissions above the network layer.
PGP
IPSec
PAP
SSL
SSL
In ____, a hacker forges name server records to falsify his host’s identity.
IP spoofing
DNS spoofing
ID spoofing
DHCP spoofing
DNS spoofing
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
router
service
concentrator
certificate authority
concentrator
____ protocols are the rules that computers follow to accomplish authentication.
Access
Availability
Authority
Authentication
Authentication