MIS 140 CH 11
A packet-level firewall examines the source and destination address of every network packet that passes though the firewall. True False
True
A software solution to correct a security hole is often referred to as a patch or update. True False
True
A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization. True False
True
An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. True False
True
An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. True False
True
Disk mirroring writes duplicate copies of all data on at least two different disks. True False
True
Intrusion primarily refers to the loss of confidentiality of organizational data. True False
True
Macro viruses can spread when an infected file is opened. True False
True
The ideal solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network True False
True
Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN. True False
False
Corrective controls reveal or discover unwanted events. True False
False
DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. True False
False
Decryption is the process of converting plaintext into ciphertext. True False
False
In transport mode, IPSec encrypts the entire IP packet. True False
False
Maintaining data integrity is not a primary goal of security. True False
False
A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet. True False
True
A brute-force attack is a method of trying to guess the correct password by trying every possible key. True False
True
Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account. True False
True
Controls are mechanisms that reduce or eliminate threats to network security. True False
True
Preventive controls mitigate or stop a person from acting or an event from occurring. True False
True
Secure Sockets Layer is an encryption standard designed for use on the Web. True False
True
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. True False
True
The CERT was established at Carnegie Mellon University. True False
True
The most common access point used by attackers to gain access to an organization's network is the Internet connection. True False
True
Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? a. Delphi team member b. script kiddies c. crackers d. professional hackers e. organization employees
a. Delphi team member
_______________ describes how an asset can be compromised by one specific threat. a. Threat scenarios b. Threat plans c. Threat hacks d. Threat contingencies e. Threat attacks
a. Threat scenarios
_______________ is an encryption standard that uses a total of 168 bits as the key. a. Triple DES b. Dial-back c. WEP d. EAP e. Ciphering
a. Triple DES
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming
a. denial-of-service attack
A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion
a. disaster
To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES
a. entrapment
Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable
a. fiber optics
Often, incidents of unauthorized access known as ___________, involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster 1
a. intrusion
A security hole is a(n): a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users b. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location c. packet-level firewall d. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution e. ANI system
a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users
According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they a. often have weaker security. b. have more assets. c. are more likely to have credit card numbers available. d. are likely off-shore. e. have lower bandwidth 1
a. often have weaker security.
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan
a. risk assessment
For Ethernet networks, a _______ switch can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming
a. secure
A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers. a. intranet b. DMZ c. zone of authority d. VLAN e. smart hub
b. DMZ
A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers. a. intranet b. DMZ c. zone of authority d. VLAN e/ smart hub
b. DMZ
A brute force attack against an encryption system: a. is called RC4 b. tries to gain access by trying every possible key c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard
b. tries to gain access by trying every possible key
A (n) ______ is a special type of virus that spreads itself without human intervention. a. snake b. worm c. Trojan horse d. boot sector virus e. stealth virus
b. worm
__________ refers to the process of translating between one set of private IP addresses inside a network and a set of public addresses outside the network. a. Translation b. Conversion c. Network Address Translation d. Proxy translation e. IP conversion.
c. Network Address Translation
Spyware, adware and DDOS agents are three types of: a. IP spoofing attacks b. Denial-of-service attacks c. Trojans d. Physical security threats e. Intrusion prevention detection approaches
c. Trojans
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaste
c. controlled chaos
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster
c. controlled chaos
________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup
c. detective
The use of hacking techniques to bring attention to a larger political or social goal is referred to as a. cracking b. ethical politics c. hacktivism d. social engineering e. brute force attacks
c. hacktivism
We can calculate the relative ___________, by multiplying the impact score by the likelihood. a. rootkit b. authentication c. risk score d. risk assessment e. risk event
c. risk score
A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk
c. uninterruptible power supply
Which of the following is not considered one of the five most common business impacts? a. Financial b. Productivity c. Reputation d. Social e. Safety
d. Social
A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board
d. certificate authority
The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: a. Trojan horse b. sniffing c. tunneling d. computer forensics e. misuse detection 1
d. computer forensics
An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster
d. destruction
Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules
d. disguising information by the use of mathematical rules, known as algorithms
Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules
d. disguising information by the use of mathematical rules, known as algorithms
Which of the following is not a method for deterring intrusion? a. training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c. using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is 'idle' for a certain amount of time e. performing social engineering
e. performing social engineering
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? a. locked doors on all communication closets b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices
e. unlocked wiring closet for network devices