Security Assessment and Auditing Test 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Penetration tests are ________.

A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.

In an access control system in which a user is being identified, authenticated, and authorized, what is the subject?

A resource to which the user has permission to access

What is an intrusion detection system (IDS)?

An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations.

True/False The purpose of a demilitarized zone (DMZ) is to maintain two connections to an Internet service provider (ISP) for redundancy.

False

True/False The term virtual private network (VPN) describes an environment in which the components that make up an application reside on different computers.

False

True/False Unshielded twisted pair (UTP) is not susceptible to interference.

False

What is meant by network access control (NAC)?

Network Access Control is an approach to computer security that attempts to unify endpoint security technology, user or system authentication and network security enforcement.

At which layer of the OSI reference model do most wide area network (WAN) protocols operate?

Physical, Data Link and Network

What is NOT a characteristic of an ordinary uninterruptible power supply (UPS)?

Provides AC power on a long-term basis

The hardware that provides one or more services to users, such as server computers, printers, and network storage devices, are known as:

Servers

A wide area network (WAN) lease, the SLA states a level of guaranteed uptime. What does SLA stand for?

Service Level Agreement

True/False A best practice for compliance in the WAN Domain is to implement load balancing on multiple wide area network (WAN) connections.

True

True/False A physical server on a LAN requires a hard disk, a network interface, and software to provide network access to files and folders on the attached disks.

True

True/False A security control in the LAN Domain is anti-malware software.

True

True/False A service level agreement (SLA) signifies that a service organization has had its control objectives and control activities examined by an independent auditing firm.

True

True/False C-I-A is the confidentiality, integrity, and availability properties that describe a secure object

True

True/False EEE 802.11 describes a standard for wireless LAN (WLAN) communication protocols

True

True/False Encryption takes cleartext data and turns it into ciphertext through the use of an algorithm and a key.

True

True/False Multifactor authentication increases the strength of any form of authentication.

True

True/False Network access control (NAC) enables you to check a client computer for compliance with security policies and either grant or deny its access to the internal network.

True

True/False One method of maximizing availability in the LAN Domain is to create secondary copies, or backups, of data in case the primary copy is damaged or deleted.

True

True/False Secure virtual private networks (VPNs) are VPNs in which all traffic is encrypted.

True

True/False Service Organization Control (SOC) report 1 is based on "Statement on Standards for Attestation Engagements (SSAE) No. 16," formerly known as SAS 7Regarding

True

True/False Shielded twisted pair (STP) cabling is immune to radio and electrical interference and transfers data at extremely high speeds.

True

True/False Shielded twisted pair (STP) cabling is similar to unshielded twisted pair (UTP) but with foil shielding around each pair.

True

True/False The Telecommunication Standardization Sector (ITU-T) is an organization that produces global telecommunications standards.

True

True/False The overall purpose of authentication requirements is to enforce the basic pillars or tenets of security.

True

Comparing 802.11ac, 802.11g, and 802.11n, 802.11g offers the fastest maximum speed.

802.11ac

Secure environments satisfy the C-I-A properties of security. C-I-A stands for __________.

Confidentiality Integrity Availability

What is the primary type of control used to protect data in the WAN Domain?

Encryption

Of the following, what is the best method of maximizing confidentiality in the Workstation Domain?

Enforce discretionary access control (DAC).

True/False A best practice for compliance in the WAN Domain is to establish a single wide area network (WAN) connection to avoid conflicts with multiple connections.

False

True/False A demilitarized zone (DMZ) defines the rules a connecting node must meet to establish a secure connection with your network.

False

True/False An intrusion detection system (IDS) is a server deliberately set up as insecure in an effort to trap or track attackers.

False

True/False Multiprotocol Label Switching (MPLS) is a local area network protocol.

False

The hardware devices that connect other devices and computers using connection media are known as:

Switches

In the LAN Domain, _________________ provides the interface between the hardware and the Application Layer software.

The Network Operating System


Ensembles d'études connexes

Week 3: One-way ANOVA and Post Hoc tests

View Set

Quantitative Reasoning: Modeling with Sequences and Series (assignment # 2)~ amdm

View Set

World Geography Chapter 6 "Eastern Europe"

View Set

Unit 1.1: The Iterative Development Process

View Set

class NCLEX questions & prep u (med surg) CANCER part 1 & 2

View Set

CH 38 prepu : allergic disorders

View Set