Deck 11: Network Security

Full screen (f)
exit full mode
Question
The CERT was established at Carnegie Mellon University.
Use Space or
up arrow
down arrow
to flip the card.
Question
Corrective controls reveal or discover unwanted events.
Question
The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.
Question
Confidentiality is not a threat to business continuity.
Question
A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000.
Question
Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.
Question
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
Question
A denial-of-service attack occurs when someone external blocks access to your network.
Question
Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.
Question
Intrusion refers to confidentiality and integrity of data
Question
Macro viruses can spread when an infected file is opened.
Question
Preventive controls mitigate or stop a person from acting or an event from occurring.
Question
Disk mirroring writes duplicate copies of all data on at least two different disks.
Question
The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.
Question
Researchers estimate that only one or two new viruses are developed every week.
Question
Integrity is not a primary goal of security.
Question
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
Question
A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.
Question
An uninterruptible power supply utilizes a second redundant disk for every disk on the server.
Question
Controls are mechanisms that reduce or eliminate threats to network security.
Question
DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages.
Question
Asymmetric encryption uses the same key to encrypt and decrypt an message..
Question
A packet-level firewall examines the source and destination address of every network packet that passes though the firewall
Question
Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.
Question
With application level firewalls, any access that has not been disabled is permitted.
Question
Fault-intolerant servers contain many redundant components to prevent failure.
Question
The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.
Question
Network cables are the easiest target for eavesdropping.
Question
Decryption is the process of converting plaintext into ciphertext.
Question
An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.
Question
A brute-force attack is a method of trying to guess the correct password by trying every possible key.
Question
A Trojan horse allows a user to access a computer from a remote location.
Question
The most common access point used by attackers to gain access to an organization's network is the dial-up access via a modem.
Question
DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM.
Question
A security hole is a bug that permits intrusion to a computer.
Question
A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.
Question
Triple DES uses a total of 512 bits as the key.
Question
Microsoft's Windows operating system meets A1 level security.
Question
Crackers are casual hackers with a limited knowledge of computer security.
Question
A patch is a software solution to correct a security hole
Question
A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.
Question
Secure Sockets Layer is an encryption standard designed for use on the Web.
Question
_________ controls stop a person from acting.

A)detective
B)corrective
C)mitigating
D)preventive
E)backup
Question
Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account.
Question
An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.
Question
Often, incidents of ___________ involve employees of the organization, surprisingly enough.

A)intrusion
B)disruption
C)controlled chaos
D)destruction
E)disaster
Question
Developing _______ helps develop a secure network.

A)rules
B)controls
C)network maps
D)vendor documentation
E)service level agreements
Question
Social engineering refers to creating a team that solves virus problems.
Question
A tornado that eliminates a network control center would be an example of a natural __________

A)disaster
B)disruption
C)controlled chaos
D)destruction
E)intrusion
Question
An example of _____ of data would be if a computer virus eliminated files on that computer.

A)disruption
B)controlled chaos
C)intrusion
D)destruction
E)disaster
Question
Which of the following is not one of the major categories or sub-categories) into which network security threats can be placed?

A)disruption
B)destruction
C)controlled chaos
D)intrusion
E)disaster
Question
The most common authentication protocol used today is Kerberos.
Question
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

A)decreased because the new sophisticated technology is far more secure than the old manual methods
B)remained the same because management was always deeply interest in control and security
C)decreased because of the change in moral and ethical codes in the U.S.to a kinder and gentler society
D)increased because this commitment to data communications has changed the potential vulnerability of the organization's assets
E)remained the same because there are very few threats to data communications
Question
In transport mode, IPSec encrypts the entire IP packet.
Question
A network switch failure is an example of an) ________ threat.

A)internal
B)disruptive
C)causal
D)intrusion
E)disaster
Question
________ controls fix a trespass into the network.

A)corrective
B)detective
C)preventive
D)mitigating
E)backup
Question
When using a digital signature, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.
Question
A host based intrusion prevention system IPS) monitors activity on the server and reports intrusions to the IPS management console.
Question
A hacker gaining access to organizational data files and resources is an example of an) ____________ threat.

A)disruptive
B)controlled chaos
C)disruptive
D)intrusion
E)disaster
Question
________ controls discover unwanted events.

A)preventive
B)corrective
C)detective
D)mitigating
E)backup
Question
Which of the following are usually the first choice for eavesdropping?

A)unshielded twisted pair
B)shielded twisted pair
C)local cables owned by the organization
D)wireless LANs
E)fiber optics
Question
_______________ is an encryption standard that uses a total of 168 bits as the key.

A)Triple DES
B)Dial-back
C)WEP
D)EAP
E)Ciphering
Question
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

A)risk assessment
B)backplane
C)mitigating control factor analysis
D)control verification worksheet
E)control test plan
Question
An) _________ is something of value and can be either hardware or software.

A)asset
B)service level agreement
C)threat
D)security plan
E)network design
Question
A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.

A)firewall
B)token system
C)ANI
D)call-back modem
E)firefighter
Question
Threat of intrusion comes from ____________.

A)the government
B)crackers
C)outside of the organization
D)both inside and outside of the organization
E)inside of the organization
Question
Which of the following is not a method for deterring intrusion?

A)training end users not to divulge passwords
B)using a smart card in conjunction with a password to gain access to a computer system
C)using biometric devices to gain access to a computer system
D)using a security software package that logs out users if that user is 'idle' for a certain amount of time
E)performing social engineering
Question
__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.

A)Translation
B)Conversion
C)Network address translation
D)Proxy translation
E)IP conversion.
Question
An) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.

A)network cloaking device
B)backup punch card reader
C)uninterruptible power supply
D)service level agreement
E)help desk
Question
For Ethernet networks, a _______ switch can make eavesdropping more difficult.

A)secure
B)Trojan horse
C)proxy
D)spoofing
E)spamming
Question
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.

A)WLANs
B)intranet
C)extranet
D)WAN
E)none of the above
Question
Which of the following is not a type of intruder who attempts to gain intrusion to computer networks?

A)Delphi team member
B)script kiddies
C)crackers
D)professional hackers
E)organization employees
Question
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

A)denial-of-service attack
B)service level agreement
C)virus
D)spamming
E)scamming
Question
An) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.

A)asset
B)service level agreement
C)threat
D)security plan
E)network design
Question
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?

A)locks on network circuits after working hours
B)passwords that disable the screen and keyboard of a computer
C)secured network cabling behind walls and above ceilings
D)use of armored cable
E)unlocked wiring closet for network devices
Question
A n) ______ is a special type of virus that spreads itself without human intervention.

A)snake
B)worm
C)Trojan horse
D)boot sector virus
E)stealth virus
Question
An) ____________, is an information system that is critical to the survival of an organization.

A)network plan
B)accounting system
C)IDS
D)mission critical application
E)firewall
Question
The key principle in preventing disruption, destruction and disaster is ___________.

A)redundancy
B)control spreadsheet
C)IDS
D)anti-virus software
E)prevention controls
Question
A sniffer program is a:

A)type of macro-virus
B)small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location
C)used in a call-back modem
D)a program that records all LAN messages received for later unauthorized) analysis
E)secure hub program
Question
Which of the following type of media is least susceptible to eavesdropping?

A)fiber optics
B)twisted pair
C)microwave
D)infrared
E)coaxial cable
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/127
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Network Security
1
The CERT was established at Carnegie Mellon University.
True
2
Corrective controls reveal or discover unwanted events.
False
3
The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.
True
4
Confidentiality is not a threat to business continuity.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
5
A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
6
Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
7
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
8
A denial-of-service attack occurs when someone external blocks access to your network.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
9
Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
10
Intrusion refers to confidentiality and integrity of data
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
11
Macro viruses can spread when an infected file is opened.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
12
Preventive controls mitigate or stop a person from acting or an event from occurring.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
13
Disk mirroring writes duplicate copies of all data on at least two different disks.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
14
The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
15
Researchers estimate that only one or two new viruses are developed every week.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
16
Integrity is not a primary goal of security.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
17
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
18
A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
19
An uninterruptible power supply utilizes a second redundant disk for every disk on the server.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
20
Controls are mechanisms that reduce or eliminate threats to network security.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
21
DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
22
Asymmetric encryption uses the same key to encrypt and decrypt an message..
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
23
A packet-level firewall examines the source and destination address of every network packet that passes though the firewall
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
24
Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
25
With application level firewalls, any access that has not been disabled is permitted.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
26
Fault-intolerant servers contain many redundant components to prevent failure.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
27
The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
28
Network cables are the easiest target for eavesdropping.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
29
Decryption is the process of converting plaintext into ciphertext.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
30
An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
31
A brute-force attack is a method of trying to guess the correct password by trying every possible key.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
32
A Trojan horse allows a user to access a computer from a remote location.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
33
The most common access point used by attackers to gain access to an organization's network is the dial-up access via a modem.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
34
DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
35
A security hole is a bug that permits intrusion to a computer.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
36
A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
37
Triple DES uses a total of 512 bits as the key.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
38
Microsoft's Windows operating system meets A1 level security.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
39
Crackers are casual hackers with a limited knowledge of computer security.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
40
A patch is a software solution to correct a security hole
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
41
A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
42
Secure Sockets Layer is an encryption standard designed for use on the Web.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
43
_________ controls stop a person from acting.

A)detective
B)corrective
C)mitigating
D)preventive
E)backup
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
44
Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
45
An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
46
Often, incidents of ___________ involve employees of the organization, surprisingly enough.

A)intrusion
B)disruption
C)controlled chaos
D)destruction
E)disaster
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
47
Developing _______ helps develop a secure network.

A)rules
B)controls
C)network maps
D)vendor documentation
E)service level agreements
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
48
Social engineering refers to creating a team that solves virus problems.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
49
A tornado that eliminates a network control center would be an example of a natural __________

A)disaster
B)disruption
C)controlled chaos
D)destruction
E)intrusion
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
50
An example of _____ of data would be if a computer virus eliminated files on that computer.

A)disruption
B)controlled chaos
C)intrusion
D)destruction
E)disaster
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is not one of the major categories or sub-categories) into which network security threats can be placed?

A)disruption
B)destruction
C)controlled chaos
D)intrusion
E)disaster
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
52
The most common authentication protocol used today is Kerberos.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
53
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

A)decreased because the new sophisticated technology is far more secure than the old manual methods
B)remained the same because management was always deeply interest in control and security
C)decreased because of the change in moral and ethical codes in the U.S.to a kinder and gentler society
D)increased because this commitment to data communications has changed the potential vulnerability of the organization's assets
E)remained the same because there are very few threats to data communications
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
54
In transport mode, IPSec encrypts the entire IP packet.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
55
A network switch failure is an example of an) ________ threat.

A)internal
B)disruptive
C)causal
D)intrusion
E)disaster
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
56
________ controls fix a trespass into the network.

A)corrective
B)detective
C)preventive
D)mitigating
E)backup
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
57
When using a digital signature, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
58
A host based intrusion prevention system IPS) monitors activity on the server and reports intrusions to the IPS management console.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
59
A hacker gaining access to organizational data files and resources is an example of an) ____________ threat.

A)disruptive
B)controlled chaos
C)disruptive
D)intrusion
E)disaster
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
60
________ controls discover unwanted events.

A)preventive
B)corrective
C)detective
D)mitigating
E)backup
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following are usually the first choice for eavesdropping?

A)unshielded twisted pair
B)shielded twisted pair
C)local cables owned by the organization
D)wireless LANs
E)fiber optics
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
62
_______________ is an encryption standard that uses a total of 168 bits as the key.

A)Triple DES
B)Dial-back
C)WEP
D)EAP
E)Ciphering
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
63
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

A)risk assessment
B)backplane
C)mitigating control factor analysis
D)control verification worksheet
E)control test plan
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
64
An) _________ is something of value and can be either hardware or software.

A)asset
B)service level agreement
C)threat
D)security plan
E)network design
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
65
A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.

A)firewall
B)token system
C)ANI
D)call-back modem
E)firefighter
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
66
Threat of intrusion comes from ____________.

A)the government
B)crackers
C)outside of the organization
D)both inside and outside of the organization
E)inside of the organization
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is not a method for deterring intrusion?

A)training end users not to divulge passwords
B)using a smart card in conjunction with a password to gain access to a computer system
C)using biometric devices to gain access to a computer system
D)using a security software package that logs out users if that user is 'idle' for a certain amount of time
E)performing social engineering
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
68
__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.

A)Translation
B)Conversion
C)Network address translation
D)Proxy translation
E)IP conversion.
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
69
An) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.

A)network cloaking device
B)backup punch card reader
C)uninterruptible power supply
D)service level agreement
E)help desk
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
70
For Ethernet networks, a _______ switch can make eavesdropping more difficult.

A)secure
B)Trojan horse
C)proxy
D)spoofing
E)spamming
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
71
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.

A)WLANs
B)intranet
C)extranet
D)WAN
E)none of the above
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is not a type of intruder who attempts to gain intrusion to computer networks?

A)Delphi team member
B)script kiddies
C)crackers
D)professional hackers
E)organization employees
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
73
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

A)denial-of-service attack
B)service level agreement
C)virus
D)spamming
E)scamming
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
74
An) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.

A)asset
B)service level agreement
C)threat
D)security plan
E)network design
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?

A)locks on network circuits after working hours
B)passwords that disable the screen and keyboard of a computer
C)secured network cabling behind walls and above ceilings
D)use of armored cable
E)unlocked wiring closet for network devices
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
76
A n) ______ is a special type of virus that spreads itself without human intervention.

A)snake
B)worm
C)Trojan horse
D)boot sector virus
E)stealth virus
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
77
An) ____________, is an information system that is critical to the survival of an organization.

A)network plan
B)accounting system
C)IDS
D)mission critical application
E)firewall
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
78
The key principle in preventing disruption, destruction and disaster is ___________.

A)redundancy
B)control spreadsheet
C)IDS
D)anti-virus software
E)prevention controls
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
79
A sniffer program is a:

A)type of macro-virus
B)small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location
C)used in a call-back modem
D)a program that records all LAN messages received for later unauthorized) analysis
E)secure hub program
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following type of media is least susceptible to eavesdropping?

A)fiber optics
B)twisted pair
C)microwave
D)infrared
E)coaxial cable
Unlock Deck
Unlock for access to all 127 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 127 flashcards in this deck.