Lesson 12 Flashcards

1
Q

5
One example of network security is the usage of passwords to protect individual accounts and information. What common sense password rule is often ignored in this case?

  • Making a password too short.
  • Making a password hard to guess and not using easy things such as a pet name or a family member’s birthday.
  • Writing the password down and leaving it in the open.
  • Making the password completely unique, not simply recycling the same password with a simple change.
A

Writing the password down and leaving it in the open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What legal and regulatory system governs the way data is handled in a medical office?
HIPAA
ATM

PCI
FERPA

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the case of webcam hacking mentioned in the lesson, the term spyware was used. What is spyware?
Viral software that destroys a computer.
Software that allows the access of data from a computer without the person’s knowledge.

Software that creates popups.
Software used by spies.

A

Software that allows the access of data from a computer without the person’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A good administrator _____ the needs of security in the organization and the capabilities of the employees in the organization.
talks about
balances

considers
ignores

A

balances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What organization sets the rules as to how credit card data is handled?
PCI
HIPAA

FDIC
ATM

A

PCI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Public and private _____ can help verify identity in transmitting a document between two parties.

Keys

Addresses

Profiles

Emails

A

keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To repudiate means to do what?

To enhance your security efforts

To breach network security

To deny or contest something

To start something over

A

To deny or contest something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The use of _____ might include a fingerprint scan to complete a bank transaction via a mobile application.

Physical signatures

Biometrics

Timestamps

Public keys

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Non-repudiation means putting measures in place to assure something cannot be denied. Which of these is a simplified method of non-repudiation?

Sending a link via social media

Delivering a document to a home address

Attaching a document to an email

Sending a letter through certified mail

A

Sending a letter through certified mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by network security?

A security team hired to protect your office equipment

Entering your password on a social networking site

Protection of electronic data and computer systems

Securing your workplace computer at night

A

Protection of electronic data and computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WPA2 Enterprise uses a _____ server for logins.

Active Directory.
RADIUS.

Kerberos.
Microsoft Access.

A

RADIUS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does WPA stand for?
Wi-Fi Protocol Adapter.
Wireless Protocol Administration.

Wireless Protection Advanced.
Wi-Fi Protected Access.

A

Wi-Fi Protected Access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What advantage does WPA2 have over WPA?
WPA2 uses the AES encryption standard.
WPA2 is open source.

WPA2 is faster.
WPA2 is widely supported.

A

WPA2 uses the AES encryption standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why did the first version of WPA use TKIP?
TKIP was cheaper.
Many old devices still used WEP and TKIP was intended to make it easy to upgrade.

TKIP had a catchy name.
TKIP was fast.

A

Many old devices still used WEP and TKIP was intended to make it easy to upgrade.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why was WEP deprecated in favor of WPA?

WEP was too slow.

WEP was insecure.

WEP was full of bugs.

WEP didn’t work on the Mac.

A

WEP was insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless technology was created to eliminate cables, yet provide _____.

additional features

a similar set of features

an identical set of features

most of the features

A

an identical set of features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WEP stands for _____.

Wireless Extra Privacy

Wired Engineer Privacy

Wireless Equivalent Privacy

Wired Equivalent Privacy

A

Wired Equivalent Privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security in a network ensures all of the following about the information that is passed around EXCEPT:

usability

safety

integrity

affordability

A

affordability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WEP affects _____ in a network.
computers
printers

wireless connections
wired connections

A

wireless connections

20
Q

WEP is part of the _____ standard.
802.11
802.11c

802.11b
802.11a

21
Q

When are guest accounts most likely necessary?
a doctor’s office in the waiting room
a doctor’s office in the consultation office

a doctor’s office in the patient’s exam rooms
a doctor’s office in the lab

A

a doctor’s office in the waiting room

22
Q

Which of these best describes the process of encryption?
only letting certain devices on
password protection

breaking something into a million pieces and reassembling it
using a secret code

A

using a secret code

23
Q

Which of these would most likely benefit from registering its MAC addresses.

a busy hospital

a school

a large department store’s guest account

a small investment firm

A

a small investment firm

24
Q

Which of these represents the strongest defense of a wireless network?
WPA2 with Guest Accounts
WEP with Guest accounts

WEP with MAC registration
WPA2 with MAC registration

A

WPA2 with MAC registration

25
Which describes the best attitude about network names? Only use numbers for network names. Never mention either the router name or the tech company that built it. Always mention the tech company that built the router in the name of the network. Always mention the router name.
Never mention either the router name or the tech company that built it.
26
Which of these best describes the Stuxnet virus? Low-level threat Non-issue Passive threat Active threat
Active threat
27
A spy keeping track of communications between two heads of state would likely use which of these? Denial of Service Sniffer Data manipulation Man in the middle
Man in the middle
28
Which of these is a type of attack that can start off as passive then turn active? Sniffer Man in the Middle Denial of Service Data modification
Sniffer
29
Which of these floods a server with requests? Sniffer Denial of Service Man in the middle Data manipulation
Denial of service
30
What is a data modification attack? When information is intercepted and changed When a worm is put on a computer When information is intercepted When anti-virus software finds a virus
When information is intercepted and changed
31
Which type of computer attack is considered a distributed attack? DoSS DRoS DDoS DoS
DDoS
32
Which of these options properly defines both a DoS and a DDoS attack? Organized electronic impulses Organized electronic incursions Establishment of organized limits Arbitrarily-set login restrictions
Organized electronic incursions
33
Which of these options contains the three basic target categories for a DoS or a DDoS? Systems, memory, and network access card Resources, printers, and storage devices Network access card, applications, and peripheral devices Networks, systems, and applications
Networks, systems, and applications
34
Which of these options contains a primary objective of a DoS or DDoS attack? Consume as much bandwidth as possible Destroy access memory Blank the screen to deny input Lock out the computer's keypad entry
Consume as much bandwidth as possible
35
Which of these answers describes one possible method to prevent or limit the impacts of a DoS or DDoS? Disable the firewall Install network interface software Install and maintain anti-virus (AV) software Install new application software
Install and maintain anti-virus (AV) software
36
Which type of computer attack is considered a distributed attack? Report an Error DoSS DDoS DRoS DoS
DDos
37
What is the maximum number of zones that can be associated to a firewall? Report an Error Four Two One Firewalls can have many zones associated to them.
Firewalls can have many zones associated to them.
38
What type of firewall can stop more advanced threats, such as tricks devised by hackers to bypass the firewall's access policy protection? Report an Error A next-generation firewall A standard firewall will block all threats and tricks An intelligent firewall A stateful inspection firewall
A next-generation firewall
39
Which word below best describes a flaw in network security which permits an assault on network resources. Report an Error Instability Vulnerability Unreliability Incompatibility
Vulnerability
40
Which of the following is NOT an element of access in regards to network security? Report an Error Authorization Accounting Authentication Availability
Availability
41
Intrusion detection systems provide what function in network security? Report an Error Provide retina scanning at the computer room door Scramble data so outsiders can't make use of it Provide badge-access only to the building Intrusion detection systems provide what function in network security? Report an Error Provide retina scanning at the computer room door Scramble data so outsiders can't make use of it Provide badge-access only to the building Alert network administrators to a breach and detect unusual activity within a network
Intrusion detection systems provide what function in network security? Report an Error Provide retina scanning at the computer room door Scramble data so outsiders can't make use of it Provide badge-access only to the building Alert network administrators to a breach and detect unusual activity within a network
42
**Which of the following is an unintentional threat to the security of computer networks?** Computer viruses Theft of Data Denial of Service (DoS) attacks Computer failures Sabotage
Computer failures
43
**Which of the following is a method for securing data by using special mathematical algorithms to convert the data into a scrambled code before transmission?** Algebra Encryption Firewall Anti-Virus Software Coding
Encryption
44
Which is the oldest, least secure method of wireless security? Report an Error TKIP WPA2 WPA WEP
WEP
45
**A multi-layered approach to network security is best because _____.** It uses less resources in your datacenter. Some brands are better than others. Different types of network security systems focus on different threats and vulnerabilities It costs less the other approaches.
Different types of network security systems focus on different threats and vulnerabilities
46
Which of the following are NOT a method to deliver network security? Report an Error Hardware appliance Software Over the telephone Cloud service
Over the telephone