Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Guide to Networking Essentials Study Set 1
Quiz 9: Introduction to Network Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Essay
Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -used to discover breaches in security
Question 22
Essay
Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -spreads by replicating itself into programs or documents
Question 23
Multiple Choice
Which of the following are true about WPA3? (Choose all that apply.)
Question 24
Essay
Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -monopolizes network services or network bandwidth
Question 25
Short Answer
A common guideline about network security is that if there's ____________ access to the equipment, there's no security.
Question 26
Multiple Choice
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
Question 27
Essay
Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity
Question 28
Multiple Choice
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
Question 29
Essay
Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -inspects packets as they go into and out of the network
Question 30
Essay
Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -malware that's activated when a particular event occurs
Question 31
Multiple Choice
Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)
Question 32
Multiple Choice
Which of the following can be used to secure data on disk drives? (Choose all that apply.)
Question 33
Essay
Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -a self-contained, self-replicating program