Network Security Basics/Computer Security Test One

¡Supera tus tareas y exámenes ahora con Quizwiz!

Dual-homed

Servers or computers that have two NIC cards, each connected to separate networks, are known as what type of computers?

VPN

If you wanted to connect 2 networks securely over the internet, what type of technology could you use?

USB

To prevent files from being copied on a workstation to removable media, you should disable which ports?

Firewalls

Which of the following devices are the first line of defense for networks connected to the internet?

111

Which port should be closed on systems to prevent the unauthorized running of programs?

XaaS

Which of the following is NOT one of the three cloud service models recognized by the NIST?

Logging the event

Which of the following is a passive method of threat response?

Type II

Which hypervisor model needs the operating system to be up and cannot boot until it is?

EAL 4

Which of the following Evaluation Assurance Levels (EAL) is the common security benchmark for commercial systems?

80

What TCP port does HTTP use?

ICMP

Which of the following is NOT a routing protocol?

10/100 Mode

In order to run "sniffer" software property, the NIC in the computer running the software must be set to this.

packet filter

A firewall operating as _______ firewall will pass or block packets based on their application or TCP port number.

Application

According to the TCP/IP model, HTTP functions at which layer?

Host-to-Host

The TCP protocol functions at which layer of the TCP/IP model?

Intrusion detection system

These are used to monitor a network for suspect activity.

Honey Pot

This is a system designed to fool attackers into thinking a system is unsecured so they will attack it. Then the "victim" will learn their attack methods without compromising a live system.

WTLS

This is the security layer for wireless 802.11 connections using WAP.

23

What TCP port does Telnet use?

Less than $1000

What would the Annualized Loss Occurrence be for the asset in Question 6 if a fire that might damage the press in that manner occurred once every 15 years?

DAC

Which access control method model allows the owner of a resource to grant privileges to information they own?

RBAC

Which access control method model grants rights or privileges based on their job function or position held?

MAC

Which access control model is a static model that uses preddefined access privileges for resources that are assigned by the administrator?

Kerberos

Which authentication method uses a Key Distribution Center (KCD)?

EAL 1

Which of the following Evaluation Assurance Levels (EAL) specifies that the user wants assurance that the system will operate correctly, but threats to security are not viewed as serious?

Unlisted

Which of the following is NOT one of the cloud delivery models recognized by NIST?

TACACS+

Which remote access protocol; implemented almost exclusively by Cisco, is a central server providing remote access usernames that dial-up users can use for authentication.

Evil twin

Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?

Mitigation

Which type of strategy is undertaken when you attempt to reduce the risk?

Transference

You have taken out an insurance policy on your data/systems to share some of the risk with another entity. What type of risk strategy is this?


Conjuntos de estudio relacionados

3.4 The Effect and Demand and Supply Shifts on Equilibrium

View Set

Economics Foolproof Module 8 notes

View Set

Chapter 32: The Building of Global Empires

View Set

ACCTG 641 Exam #1 Review - MC Questions

View Set

J: Chapter 17: Mood Disorders and Suicide

View Set

Data Collection, Behavior, and Decisions

View Set