Lesson 12 Flashcards
5
One example of network security is the usage of passwords to protect individual accounts and information. What common sense password rule is often ignored in this case?
- Making a password too short.
- Making a password hard to guess and not using easy things such as a pet name or a family member’s birthday.
- Writing the password down and leaving it in the open.
- Making the password completely unique, not simply recycling the same password with a simple change.
Writing the password down and leaving it in the open.
What legal and regulatory system governs the way data is handled in a medical office?
HIPAA
ATM
PCI
FERPA
HIPAA
In the case of webcam hacking mentioned in the lesson, the term spyware was used. What is spyware?
Viral software that destroys a computer.
Software that allows the access of data from a computer without the person’s knowledge.
Software that creates popups.
Software used by spies.
Software that allows the access of data from a computer without the person’s knowledge.
A good administrator _____ the needs of security in the organization and the capabilities of the employees in the organization.
talks about
balances
considers
ignores
balances
What organization sets the rules as to how credit card data is handled?
PCI
HIPAA
FDIC
ATM
PCI
Public and private _____ can help verify identity in transmitting a document between two parties.
Keys
Addresses
Profiles
Emails
keys
To repudiate means to do what?
To enhance your security efforts
To breach network security
To deny or contest something
To start something over
To deny or contest something
The use of _____ might include a fingerprint scan to complete a bank transaction via a mobile application.
Physical signatures
Biometrics
Timestamps
Public keys
Biometrics
Non-repudiation means putting measures in place to assure something cannot be denied. Which of these is a simplified method of non-repudiation?
Sending a link via social media
Delivering a document to a home address
Attaching a document to an email
Sending a letter through certified mail
Sending a letter through certified mail
What is meant by network security?
A security team hired to protect your office equipment
Entering your password on a social networking site
Protection of electronic data and computer systems
Securing your workplace computer at night
Protection of electronic data and computer systems
WPA2 Enterprise uses a _____ server for logins.
Active Directory.
RADIUS.
Kerberos.
Microsoft Access.
RADIUS.
What does WPA stand for?
Wi-Fi Protocol Adapter.
Wireless Protocol Administration.
Wireless Protection Advanced.
Wi-Fi Protected Access.
Wi-Fi Protected Access.
What advantage does WPA2 have over WPA?
WPA2 uses the AES encryption standard.
WPA2 is open source.
WPA2 is faster.
WPA2 is widely supported.
WPA2 uses the AES encryption standard.
Why did the first version of WPA use TKIP?
TKIP was cheaper.
Many old devices still used WEP and TKIP was intended to make it easy to upgrade.
TKIP had a catchy name.
TKIP was fast.
Many old devices still used WEP and TKIP was intended to make it easy to upgrade.
Why was WEP deprecated in favor of WPA?
WEP was too slow.
WEP was insecure.
WEP was full of bugs.
WEP didn’t work on the Mac.
WEP was insecure.
Wireless technology was created to eliminate cables, yet provide _____.
additional features
a similar set of features
an identical set of features
most of the features
an identical set of features
WEP stands for _____.
Wireless Extra Privacy
Wired Engineer Privacy
Wireless Equivalent Privacy
Wired Equivalent Privacy
Wired Equivalent Privacy.
Security in a network ensures all of the following about the information that is passed around EXCEPT:
usability
safety
integrity
affordability
affordability
WEP affects _____ in a network.
computers
printers
wireless connections
wired connections
wireless connections
WEP is part of the _____ standard.
802.11
802.11c
802.11b
802.11a
802.11b
When are guest accounts most likely necessary?
a doctor’s office in the waiting room
a doctor’s office in the consultation office
a doctor’s office in the patient’s exam rooms
a doctor’s office in the lab
a doctor’s office in the waiting room
Which of these best describes the process of encryption?
only letting certain devices on
password protection
breaking something into a million pieces and reassembling it
using a secret code
using a secret code
Which of these would most likely benefit from registering its MAC addresses.
a busy hospital
a school
a large department store’s guest account
a small investment firm
a small investment firm
Which of these represents the strongest defense of a wireless network?
WPA2 with Guest Accounts
WEP with Guest accounts
WEP with MAC registration
WPA2 with MAC registration
WPA2 with MAC registration