Deck 10: Network Security

ملء الشاشة (f)
exit full mode
سؤال
Disk mirroring writes duplicate copies of all data on at least two different disks.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A denial-of-service attack occurs when someone external blocks access to your network.
سؤال
The CERT at Carnegie Mellon University was established by the U.S.Department of Agriculture in 1988.
سؤال
Preventive controls mitigate or stop a person from acting or an event from occurring.
سؤال
A control spreadsheet lists threats to the network across the top of the spreadsheet and lists the network assets down the side of the sheet.
سؤال
A threat to the data communications network is any potential adverse occurrence that can do harm,interrupt the systems using the network,or cause a monetary loss to the organization.
سؤال
Integrity is not a primary goal of security.
سؤال
An uninterruptible power supply utilizes a second redundant disk for every disk on the server.
سؤال
Intrusion refers to confidentiality and integrity of data
سؤال
Confidentiality is not a threat to business continuity.
سؤال
With the passage of HIPAA and the Sarbanes-Oxley Act,more and more regulations are addressing security.
سؤال
A Delphi team that helps the network manager assess the security risks to the organization should always have at least 20 members.
سؤال
A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000.
سؤال
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
سؤال
Corrective controls reveal or discover unwanted events.
سؤال
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
سؤال
Business continuity planning refers primarily to ensuring availability,with some aspects of data integrity.
سؤال
Controls are mechanisms that reduce or eliminate threats to network security.
سؤال
Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.
سؤال
The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.
سؤال
Triple DES uses a total of 512 bits as the key.
سؤال
Fault-intolerant servers contain many redundant components to prevent failure.
سؤال
Crackers are casual hackers with a limited knowledge of computer security.
سؤال
An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.
سؤال
DoS attackers generally use fake source IP addresses,making it harder to identify the DoS messages.
سؤال
The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.
سؤال
A packet-level firewall examines the source and destination address of every network packet that passes though the firewall
سؤال
A NAT proxy server uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.
سؤال
Network cables are the easiest target for eavesdropping.
سؤال
A patch is a software solution to correct a security hole
سؤال
The most common access point used by attackers to gain access to an organization's network is the dial-up access via a modem.
سؤال
A Trojan horse allows a user to access a computer from a remote location.
سؤال
The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.
سؤال
Decryption is the process of converting plaintext into ciphertext.
سؤال
Microsoft's Windows operating system meets A1 level security.
سؤال
Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.
سؤال
A security hole is a bug that permits intrusion to a computer.
سؤال
With application level firewalls,any access that has not been disabled is permitted.
سؤال
Macro viruses can spread when an infected file is opened.
سؤال
Researchers estimate that only one or two new viruses are developed every week.
سؤال
In transport mode,IPSec encrypts the entire IP packet.
سؤال
_________ controls stop a person from acting.

A) detective
B) corrective
C) mitigating
D) preventive
E) backup
سؤال
In recent years,management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

A) decreased because the new sophisticated technology is far more secure than the old manual methods
B) remained the same because management was always deeply interest in control and security
C) decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society
D) increased because this commitment to data communications has changed the potential vulnerability of the organization's assets
E) remained the same because there are very few threats to data communications
سؤال
An example of _____ of data would be if a computer virus eliminated files on that computer.

A) disruption
B) controlled chaos
C) intrusion
D) destruction
E) disaster
سؤال
Asymmetric encryption uses the same key to encrypt and decrypt an message..
سؤال
Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account.
سؤال
Secure Sockets Layer is an encryption standard designed for use on the Web.
سؤال
A hacker gaining access to organizational data files and resources is an example of a(n)____________ threat.

A) disruptive
B) controlled chaos
C) disruptive
D) intrusion
E) disaster
سؤال
Developing _______ helps develop a secure network.

A) rules
B) controls
C) network maps
D) vendor documentation
E) service level agreements
سؤال
A host based intrusion prevention system (IPS)monitors activity on the server and reports intrusions to the IPS management console.
سؤال
When using a digital signature,the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.
سؤال
Often,incidents of ___________ involve employees of the organization,surprisingly enough.

A) intrusion
B) disruption
C) controlled chaos
D) destruction
E) disaster
سؤال
Social engineering refers to creating a team that solves virus problems.
سؤال
Which of the following is not one of the major categories (or sub-categories)into which network security threats can be placed?

A) disruption
B) destruction
C) controlled chaos
D) intrusion
E) disaster
سؤال
DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM.
سؤال
A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.
سؤال
A network switch failure is an example of a(n)________ threat.

A) internal
B) disruptive
C) causal
D) intrusion
E) disaster
سؤال
A brute-force attack is a method of trying to guess the correct password by trying every possible key.
سؤال
The most common authentication protocol used today is Kerberos.
سؤال
A tornado that eliminates a network control center would be an example of a natural __________

A) disaster
B) disruption
C) controlled chaos
D) destruction
E) intrusion
سؤال
Which of the following are usually the first choice for eavesdropping?

A) unshielded twisted pair
B) shielded twisted pair
C) local cables owned by the organization
D) infrared
E) fiber optics
سؤال
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?

A) locks on network circuits after working hours
B) passwords that disable the screen and keyboard of a computer
C) secured network cabling behind walls and above ceilings
D) use of armored cable
E) unlocked wiring closet for network devices
سؤال
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

A) denial-of-service attack
B) service level agreement
C) virus
D) spamming
E) scamming
سؤال
_______________ is an encryption standard that uses a total of 168 bits as the key.

A) Triple DES
B) Dial-back
C) WEP
D) EAP
E) Ciphering
سؤال
Which of the following is not a type of intruder who attempts to gain intrusion to computer networks?

A) Delphi team member
B) script kiddies
C) crackers
D) professional hackers
E) organization employees
سؤال
A(n)____________,is an information system that is critical to the survival of an organization.

A) network plan
B) accounting system
C) IDS
D) mission critical application
E) firewall
سؤال
A(n)___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.

A) network cloaking device
B) backup punch card reader
C) uninterruptible power supply
D) service level agreement
E) help desk
سؤال
The key principle in preventing disruption,destruction and disaster is ___________.

A) redundancy
B) control spreadsheet
C) IDS
D) anti-virus software
E) prevention controls
سؤال
The three basic network access points into most organizational networks are from the Internet,from LANs inside of the organization and ________________.

A) dial-up access through a modem
B) intranet
C) extranet
D) WAN
E) none of the above
سؤال
A sniffer program is a:

A) type of macro-virus
B) small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location
C) used in a call-back modem
D) a program that records all LAN messages received for later (unauthorized) analysis
E) secure hub program
سؤال
A (n)______ is a special type of virus that spreads itself without human intervention.

A) snake
B) worm
C) Trojan horse
D) boot sector virus
E) stealth virus
سؤال
Which of the following type of media is least susceptible to eavesdropping?

A) fiber optics
B) twisted pair
C) microwave
D) infrared
E) coaxial cable
سؤال
A(n)_________ is something of value and can be either hardware or software.

A) asset
B) service level agreement
C) threat
D) security plan
E) network design
سؤال
Which of the following is not a method for deterring intrusion?

A) training end users not to divulge passwords
B) using a smart card in conjunction with a password to gain access to a computer system
C) using biometric devices to gain access to a computer system
D) using a security software package that logs out users if that user is 'idle' for a certain amount of time
E) performing social engineering
سؤال
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

A) risk assessment
B) backplane
C) mitigating control factor analysis
D) control verification worksheet
E) control test plan
سؤال
________ controls discover unwanted events.

A) preventive
B) corrective
C) detective
D) mitigating
E) backup
سؤال
For Ethernet networks,a _______ switch can make eavesdropping more difficult.

A) secure
B) Trojan horse
C) proxy
D) spoofing
E) spamming
سؤال
A(n)__________ is any potential adverse occurrence that can do harm,interrupt the system using the network to cause monetary loss to the organization.

A) asset
B) service level agreement
C) threat
D) security plan
E) network design
سؤال
Threat of intrusion comes from ____________.

A) the government
B) crackers
C) outside of the organization
D) both inside and outside of the organization
E) inside of the organization
سؤال
________ controls fix a trespass into the network.

A) corrective
B) detective
C) preventive
D) mitigating
E) backup
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/122
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Network Security
1
Disk mirroring writes duplicate copies of all data on at least two different disks.
True
2
A denial-of-service attack occurs when someone external blocks access to your network.
True
3
The CERT at Carnegie Mellon University was established by the U.S.Department of Agriculture in 1988.
False
4
Preventive controls mitigate or stop a person from acting or an event from occurring.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
5
A control spreadsheet lists threats to the network across the top of the spreadsheet and lists the network assets down the side of the sheet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
6
A threat to the data communications network is any potential adverse occurrence that can do harm,interrupt the systems using the network,or cause a monetary loss to the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
7
Integrity is not a primary goal of security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
8
An uninterruptible power supply utilizes a second redundant disk for every disk on the server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
9
Intrusion refers to confidentiality and integrity of data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
10
Confidentiality is not a threat to business continuity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
11
With the passage of HIPAA and the Sarbanes-Oxley Act,more and more regulations are addressing security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
12
A Delphi team that helps the network manager assess the security risks to the organization should always have at least 20 members.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
13
A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
14
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
15
Corrective controls reveal or discover unwanted events.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
16
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
17
Business continuity planning refers primarily to ensuring availability,with some aspects of data integrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
18
Controls are mechanisms that reduce or eliminate threats to network security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
19
Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
20
The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
21
Triple DES uses a total of 512 bits as the key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
22
Fault-intolerant servers contain many redundant components to prevent failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
23
Crackers are casual hackers with a limited knowledge of computer security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
24
An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
25
DoS attackers generally use fake source IP addresses,making it harder to identify the DoS messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
26
The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
27
A packet-level firewall examines the source and destination address of every network packet that passes though the firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
28
A NAT proxy server uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
29
Network cables are the easiest target for eavesdropping.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
30
A patch is a software solution to correct a security hole
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
31
The most common access point used by attackers to gain access to an organization's network is the dial-up access via a modem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
32
A Trojan horse allows a user to access a computer from a remote location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
33
The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
34
Decryption is the process of converting plaintext into ciphertext.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
35
Microsoft's Windows operating system meets A1 level security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
36
Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
37
A security hole is a bug that permits intrusion to a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
38
With application level firewalls,any access that has not been disabled is permitted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
39
Macro viruses can spread when an infected file is opened.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
40
Researchers estimate that only one or two new viruses are developed every week.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
41
In transport mode,IPSec encrypts the entire IP packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
42
_________ controls stop a person from acting.

A) detective
B) corrective
C) mitigating
D) preventive
E) backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
43
In recent years,management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

A) decreased because the new sophisticated technology is far more secure than the old manual methods
B) remained the same because management was always deeply interest in control and security
C) decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society
D) increased because this commitment to data communications has changed the potential vulnerability of the organization's assets
E) remained the same because there are very few threats to data communications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
44
An example of _____ of data would be if a computer virus eliminated files on that computer.

A) disruption
B) controlled chaos
C) intrusion
D) destruction
E) disaster
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
45
Asymmetric encryption uses the same key to encrypt and decrypt an message..
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
46
Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
47
Secure Sockets Layer is an encryption standard designed for use on the Web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
48
A hacker gaining access to organizational data files and resources is an example of a(n)____________ threat.

A) disruptive
B) controlled chaos
C) disruptive
D) intrusion
E) disaster
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
49
Developing _______ helps develop a secure network.

A) rules
B) controls
C) network maps
D) vendor documentation
E) service level agreements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
50
A host based intrusion prevention system (IPS)monitors activity on the server and reports intrusions to the IPS management console.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
51
When using a digital signature,the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
52
Often,incidents of ___________ involve employees of the organization,surprisingly enough.

A) intrusion
B) disruption
C) controlled chaos
D) destruction
E) disaster
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
53
Social engineering refers to creating a team that solves virus problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is not one of the major categories (or sub-categories)into which network security threats can be placed?

A) disruption
B) destruction
C) controlled chaos
D) intrusion
E) disaster
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
55
DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
56
A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
57
A network switch failure is an example of a(n)________ threat.

A) internal
B) disruptive
C) causal
D) intrusion
E) disaster
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
58
A brute-force attack is a method of trying to guess the correct password by trying every possible key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
59
The most common authentication protocol used today is Kerberos.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
60
A tornado that eliminates a network control center would be an example of a natural __________

A) disaster
B) disruption
C) controlled chaos
D) destruction
E) intrusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following are usually the first choice for eavesdropping?

A) unshielded twisted pair
B) shielded twisted pair
C) local cables owned by the organization
D) infrared
E) fiber optics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?

A) locks on network circuits after working hours
B) passwords that disable the screen and keyboard of a computer
C) secured network cabling behind walls and above ceilings
D) use of armored cable
E) unlocked wiring closet for network devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
63
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

A) denial-of-service attack
B) service level agreement
C) virus
D) spamming
E) scamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
64
_______________ is an encryption standard that uses a total of 168 bits as the key.

A) Triple DES
B) Dial-back
C) WEP
D) EAP
E) Ciphering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
65
Which of the following is not a type of intruder who attempts to gain intrusion to computer networks?

A) Delphi team member
B) script kiddies
C) crackers
D) professional hackers
E) organization employees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
66
A(n)____________,is an information system that is critical to the survival of an organization.

A) network plan
B) accounting system
C) IDS
D) mission critical application
E) firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
67
A(n)___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.

A) network cloaking device
B) backup punch card reader
C) uninterruptible power supply
D) service level agreement
E) help desk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
68
The key principle in preventing disruption,destruction and disaster is ___________.

A) redundancy
B) control spreadsheet
C) IDS
D) anti-virus software
E) prevention controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
69
The three basic network access points into most organizational networks are from the Internet,from LANs inside of the organization and ________________.

A) dial-up access through a modem
B) intranet
C) extranet
D) WAN
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
70
A sniffer program is a:

A) type of macro-virus
B) small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location
C) used in a call-back modem
D) a program that records all LAN messages received for later (unauthorized) analysis
E) secure hub program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
71
A (n)______ is a special type of virus that spreads itself without human intervention.

A) snake
B) worm
C) Trojan horse
D) boot sector virus
E) stealth virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following type of media is least susceptible to eavesdropping?

A) fiber optics
B) twisted pair
C) microwave
D) infrared
E) coaxial cable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
73
A(n)_________ is something of value and can be either hardware or software.

A) asset
B) service level agreement
C) threat
D) security plan
E) network design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following is not a method for deterring intrusion?

A) training end users not to divulge passwords
B) using a smart card in conjunction with a password to gain access to a computer system
C) using biometric devices to gain access to a computer system
D) using a security software package that logs out users if that user is 'idle' for a certain amount of time
E) performing social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
75
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

A) risk assessment
B) backplane
C) mitigating control factor analysis
D) control verification worksheet
E) control test plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
76
________ controls discover unwanted events.

A) preventive
B) corrective
C) detective
D) mitigating
E) backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
77
For Ethernet networks,a _______ switch can make eavesdropping more difficult.

A) secure
B) Trojan horse
C) proxy
D) spoofing
E) spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
78
A(n)__________ is any potential adverse occurrence that can do harm,interrupt the system using the network to cause monetary loss to the organization.

A) asset
B) service level agreement
C) threat
D) security plan
E) network design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
79
Threat of intrusion comes from ____________.

A) the government
B) crackers
C) outside of the organization
D) both inside and outside of the organization
E) inside of the organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
80
________ controls fix a trespass into the network.

A) corrective
B) detective
C) preventive
D) mitigating
E) backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 122 في هذه المجموعة.