Chapter 11 quiz Flashcards

1
Q

Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network security is more often compromised “from the inside” than from external sources.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption is the last means of defense against data theft.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

By default, the 802.11 standard offers substantial security.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Cracking
Hacking
War driving
Phishing

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a ____ attack, a person redirects or captures secure transmissions as they occur.
denial-of service
man-in-the-middle
war driving
phishing

A

man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ software searches a node for open ports.
Phishing
Sniffing
Authentication
Port scanner

A

Port scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.
people
transmission and hardware
protocols and software
Internet access

A

transmission and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A NOS that contains a “back door”is an example of a risk associated with ____.
people
transmission and hardware
protocols and software
Internet access

A

protocols and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
flashing
denial-of-service
war driving
phishing

A

flashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
flashing
denial-of-service
war driving
phishing

A

denial-of-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
switch’s
gateway’s
router’s
proxy server’s

A

router’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
packet-filtering
gateway
proxy
selective

A

packet-filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
flashing
denial-of-service
dictionary
brute force

A

dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
flashing
denial-of-service
dictionary
brute force

A

brute force

17
Q

The combination of a public key and a private key is known as a ____.
key lock
key frame
key pair
key set

A

key pair

18
Q

A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
digital certificate
authentication file
access control list
authentication certificate

A

digital certificate

19
Q

The use of certificate authorities to associate public keys with certain users is known as ____.
PGP
PKI
IPSec
SSL

A

PKI

20
Q

____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
PGP
SSH
IPSec
SSL

A

PGP

21
Q

____ is a method of encrypting TCP/IP transmissions above the network layer.
PGP
IPSec
PAP
SSL

A

SSL

22
Q

In ____, a hacker forges name server records to falsify his host’s identity.
IP spoofing
DNS spoofing
ID spoofing
DHCP spoofing

A

DNS spoofing

23
Q

A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
router
service
concentrator
certificate authority

A

concentrator

24
Q

____ protocols are the rules that computers follow to accomplish authentication.
Access
Availability
Authority
Authentication

A

Authentication

25
Q

RADIUS and TACACS belong to a category of protocols known as AAA (____).
access, authorization, and accounting
authentication, authorization, and accounting
authentication, authorization, and authority
authentication, authorization, and access

A

authentication, authorization, and accounting

26
Q

In ____, both computers verify the credentials of the other.
mutual authorization
mutual access
mutual authentication
mutual verification

A

mutual authentication