Lesson 12 Flashcards
5
One example of network security is the usage of passwords to protect individual accounts and information. What common sense password rule is often ignored in this case?
- Making a password too short.
- Making a password hard to guess and not using easy things such as a pet name or a family member’s birthday.
- Writing the password down and leaving it in the open.
- Making the password completely unique, not simply recycling the same password with a simple change.
Writing the password down and leaving it in the open.
What legal and regulatory system governs the way data is handled in a medical office?
HIPAA
ATM
PCI
FERPA
HIPAA
In the case of webcam hacking mentioned in the lesson, the term spyware was used. What is spyware?
Viral software that destroys a computer.
Software that allows the access of data from a computer without the person’s knowledge.
Software that creates popups.
Software used by spies.
Software that allows the access of data from a computer without the person’s knowledge.
A good administrator _____ the needs of security in the organization and the capabilities of the employees in the organization.
talks about
balances
considers
ignores
balances
What organization sets the rules as to how credit card data is handled?
PCI
HIPAA
FDIC
ATM
PCI
Public and private _____ can help verify identity in transmitting a document between two parties.
Keys
Addresses
Profiles
Emails
keys
To repudiate means to do what?
To enhance your security efforts
To breach network security
To deny or contest something
To start something over
To deny or contest something
The use of _____ might include a fingerprint scan to complete a bank transaction via a mobile application.
Physical signatures
Biometrics
Timestamps
Public keys
Biometrics
Non-repudiation means putting measures in place to assure something cannot be denied. Which of these is a simplified method of non-repudiation?
Sending a link via social media
Delivering a document to a home address
Attaching a document to an email
Sending a letter through certified mail
Sending a letter through certified mail
What is meant by network security?
A security team hired to protect your office equipment
Entering your password on a social networking site
Protection of electronic data and computer systems
Securing your workplace computer at night
Protection of electronic data and computer systems
WPA2 Enterprise uses a _____ server for logins.
Active Directory.
RADIUS.
Kerberos.
Microsoft Access.
RADIUS.
What does WPA stand for?
Wi-Fi Protocol Adapter.
Wireless Protocol Administration.
Wireless Protection Advanced.
Wi-Fi Protected Access.
Wi-Fi Protected Access.
What advantage does WPA2 have over WPA?
WPA2 uses the AES encryption standard.
WPA2 is open source.
WPA2 is faster.
WPA2 is widely supported.
WPA2 uses the AES encryption standard.
Why did the first version of WPA use TKIP?
TKIP was cheaper.
Many old devices still used WEP and TKIP was intended to make it easy to upgrade.
TKIP had a catchy name.
TKIP was fast.
Many old devices still used WEP and TKIP was intended to make it easy to upgrade.
Why was WEP deprecated in favor of WPA?
WEP was too slow.
WEP was insecure.
WEP was full of bugs.
WEP didn’t work on the Mac.
WEP was insecure.
Wireless technology was created to eliminate cables, yet provide _____.
additional features
a similar set of features
an identical set of features
most of the features
an identical set of features
WEP stands for _____.
Wireless Extra Privacy
Wired Engineer Privacy
Wireless Equivalent Privacy
Wired Equivalent Privacy
Wired Equivalent Privacy.
Security in a network ensures all of the following about the information that is passed around EXCEPT:
usability
safety
integrity
affordability
affordability