Network Security Basics Test #1

¡Supera tus tareas y exámenes ahora con Quizwiz!

If SLE is calculated at $2,500 and there are an anticipated 4 occurrences a year (ARO), then ALE is:

$10,000.

___________________ is an attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.

Disassociation.

Servers or computers that have two NIC cards, each connected to separate networks, are known as what type of computers?

Dual-Homed Firewall.

Which of the following devices are the first line of defense for networks connected to the Internet?

Firewalls.

Separation of duties polices are designed to reduce the risk of what?

Fraud.

Whether or not your server operating system can force the change of a password is considered what kind of a security issue?

Operational.

Which remote access protocol, implemented almost exclusively by Cisco, is a central server providing remote access usernames that dial-up users can use for authentication.

RADIUS.

You have taken out an insurance policy on your data/systems to share some of the risk with another entity. What type of risk strategy is this?

Transference.

Which hypervisor model needs the operating system to be up and cannot boot until it is?

Type II.

Which of the following is NOT one of the cloud delivery models recognized by NIST?

Unlisted.

Which of the following is a passive method of threat response?

Changing Network Configuration.

Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?

Evil Twin.

A ___________________ is a system designed to fool attackers into thinking a system is unsecured so they will attack it. Then the "victim" will learn their attack methods without compromising a live system.

Honey Pot.

In TCP/IP parlance, any computer or device with an IP address on a TCP/IP network is known as a(n):

Host.

What is the machine on which virtualization software is running known as?

Host.

Which of the following is NOT a routing protocol?

ICMP.

Wireless Ethernet conforms to which IEEE standard?

IEEE 802.11.

A(n) ___________________ is a broad term that applies to a wide range of systems used to manage information security.

ISMS.

___________________ are used to monitor a network for suspect activity.

Intrusion Detection Systems.

Which authentication method uses a Key Distribution Center (KCD)?

Kerberos.

Which access control model is a static model that uses predefined access privileges for resources that are assigned by the administrator?

MAC.

When assigning permissions to users, which principle should you adhere to?

Manifest Destiny.

Which type of risk strategy is undertaken when you attempt to reduce the risk?

Mitigation.

A firewall operating as a ___________________ firewall will pass or block packets based on their application or TCP port number.

Packet Filter.

What protocol is used by technologies for load balancing/prioritizing traffic?

QoS.

When the entire network, including all security devices, is virtualized, this is known as:

SDN.

___________________ is the security layer for wireless 802.11 connections using WAP.

WIP.

What technology is used to simplify network setup by allowing a router to have the administrator push a button on it to allow a new host to join?

WPS.

Which of the following is NOT one of the three cloud service models recognized by the NIST?

XaaS.

Which of the following is a single sign-on system used widely on the Internet?

Shibboleth.


Conjuntos de estudio relacionados

allusions - Elijah and the Chariot of Fire to the Golden Calf

View Set

Federal Privacy Protection and Consumer Identification Laws

View Set

CIS 345 Operating Systems Chapter 1 Vocabulary

View Set

Heath & Wellness Chapters 4, 5, & 6

View Set

Describe how light passes through the eye and how an image is formed on the retina

View Set

Chapter 34: The Dying Child Prep U PEDS

View Set