Info and Network Security Chapter 11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A good password has at least ______ characters. Answers: 15 6 10 8

Selected Answer: 8

A password policy for a 90- or 180-day replacement schedule is called password ________. Answers: Recovery Uniqueness History Age

Selected Answer: Age

Jerod is setting up security for a server room for a university. Which of the following is true of the room in which the server is located? Answers: It should be in the most fire-resistant room in the building. It should have a strong lock with a strong door It should be accessible only to those who have a need for access All of the above

Selected Answer: All of the above

If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use? Answers: Do not block any ports Block all ports except 80 Block all ports that you don't need Do not block well-known ports

Selected Answer: Block all ports that you don't need

Teresa is explaining basic security to a new technician. She is teaching him how to secure ports on any server or workstation. What is the rule about ports? Answers: Block ICMP packets Block all unused ports Block all nonstandard ports Block all incoming ports.

Selected Answer: Block all unused ports

Which of the following certifications is the most prestigious? Answers: MCSA CISSP Security+ PE

Selected Answer: CISSP

A _________ involves setting up two firewalls: an outer and an inner firewall. Answers: DHCP server proxy server DNS server DMZ (demilitarized zone)

Selected Answer: DMZ (demilitarized zone)

A good password should contain only letters and numbers. Answers: True False

Selected Answer: False

For individual computers not running firewall software, you should directly close ports. Answers: True False

Selected Answer: False

Windows has a built in firewall, but Linux does not. Answers: True False

Selected Answer: False

The process to make a system as secure as it can be without adding on specialized software or equipment is _______________ Answers: Securitizing Tracking Hardening Routing

Selected Answer: Hardening

What is password age? Answers: A reference to a password's length A reference to the sophistication (maturity) of the password How long a user has had a password. The length of the password history

Selected Answer: How long a user has had a password.

Elizabeth is responsible for security policies at her policies. She is trying to implement sound end user security policies. What would be most important to block end users from doing on their own machine? Answers: Surfing the web and using chat rooms Running programs other than those installed by the IT staff Installing software or changing system settings Changing their screensaver and using chat rooms

Selected Answer: Installing software or changing system settings

John is now responsible for system security at a small bookkeeping firm. He wants to ensure he implements good fundamental security. According to the textbook, what is the first rule of computer security? Answers: Keep systems patched. Always use an IDS Install a firewall Always use antispyware

Selected Answer: Keep systems patched.

You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password. This is particularly important if your password policy has a history depth of five. Answers: Minimum password age Minimum password length Maximum password age Maximum password length

Selected Answer: Minimum password age

On a server, you should create your own accounts with ________ that reflect their level of permission. Answers: Names Numbers Passwords Alias

Selected Answer: Names

What is the preferred method for storing backups? Answers: Near the server for quick restore if needed In the IT manager's office for security At the home of one of the IT staff Offsite in a secure location

Selected Answer: Offsite in a secure location

Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year. Answers: Twice Once Four times Three times

Selected Answer: Once

What is the minimum frequency for system probing and audits? Answers: Once per month Once per year Every other month Every other year

Selected Answer: Once per year

What is the rule on downloading from the Internet? Answers: Only download from well-known, reputable sites Only download if the download is free of charge Never download executables. Only download graphics. Never download anything

Selected Answer: Only download from well-known, reputable sites

Mohammed is responsible for security policies at a university. He is trying to ensure proper access policies. What is the rule of thumb on data access? Answers: All employees should have access to any data used in their department Only administrators and supervisors should access sensitive data A data must be available to the widest range of prople possible Only those with a need for the specific data should have access

Selected Answer: Only those with a need for the specific data should have access

The first rule of computer security is to check ___________. Answers: Patches Ports Policies Protocols

Selected Answer: Patches

An audit should check what areas? Answers: Only probe for flaws Perform system patching, review policies, check personnel records of all managers, and probe for flaws Perform system patches, probe for flaws, check logs, and review policies Check all machines for illicit software, perform complete system virus scan, and review firewall policies.

Selected Answer: Perform system patches, probe for flaws, check logs, and review policies

Any _________ you do not explicitly need should be shut down. Answers: Ports Patches Probes Policies

Selected Answer: Ports

What are the six Ps of security? Answers: Patch, ports, personnel, privacy, protect, policies. Physical, privacy, patch, ports probe, protect. Ports, patch, probe, physical, privacy, policies. Ports, patch, protect, probe, policies, physical.

Selected Answer: Ports, patch, protect, probe, policies, physical.

You are trying to implement good fundamental security for a small company. Which of the following is the least essential device for protecting your network? Answers: Virus scanners on all machines Proxy server Firewall IDS system

Selected Answer: Proxy server

Which of the following is a common way to establish security between a web server and a network? Answers: Do not connect your network to the web server Block all traffic between the web server and the network Place virus scanning between the network and the web server Put a firewall between the web server and the network

Selected Answer: Put a firewall between the web server and the network

The rule that packets not originating from inside your LAN should not be forwarded relates to ___________. Answers: Web servers Workstations Routers Servers

Selected Answer: Routers

Which of the following is a step you might take for large networks but not for smaller networks? Answers: Do criminal background checks for network administrators Use antivirus software on all machines on the network Segment the network with firewalls between the segments Use an IDS

Selected Answer: Segment the network with firewalls between the segments

For an individual machine that is not running firewall software, you do not directly close ports. You shut down the _________ using that port. Answers: Probe Service Patch Router

Selected Answer: Service

Which of the following set of credentials would be best for a security consultant? Answers: Eleven years of IT experience, 3 years in security, MCSE and CISSP, M.S. in information systems. Ten years of IT experience, 1 year in security, CIW Security analyst, M.B.A. Ten years of experience as a hacker and cracker, MCSE/CIW and Security+, Ph.D in computer science. Eight years of IT experience, 3 years in security, CISSP, B.S. in computer science

Selected Answer: Ten years of experience as a hacker and cracker, MCSE/CIW and Security+, Ph.D in computer science.

Miguel is trying to secure a web server. He has decided to shut down any services that are not needed. His supervisor has told him to check dependencies first. Which of the following is a good reason to check dependencies before shutting down a service? Answers: To find out what this service does To find out whether this service is critical to system operations, To determine whether you will need to shut down other services as well To determine whether shutting down this service will affect other services.

Selected Answer: To determine whether shutting down this service will affect other services.

A good rule of thumb for a password history policy is a history depth of five. Answers: True False

Selected Answer: True

CNE, MCITP, CISSP, and CCNA are examples of industry certifications. Answers: True False

Selected Answer: True

Every open port on a router is a possible avenue of entry for a malware or intruder. Answers: True False

Selected Answer: True

Experience is the most important factor when looking for a security professional. Answers: True False

Selected Answer: True

Microsoft Baseline Security Analyzer (MBSA) checks one or more Windows machines to see if they have basic security in place. Answers: True False

Selected Answer: True

Nessus is the premiere network vulnerability scanner. Answers: True False

Selected Answer: True

There should be a firewall between your network and the outside world. Answers: True False

Selected Answer: True

Which of the following is a step you would definitely take with any server but might not be required for a workstation? Answers: Uninstall all unneeded programs/software Disabling ununsed SSH and XRDP services. Block all Internet access Turn off the screensaver

Selected Answer: Uninstall all unneeded programs/software

You work in the network security department of a large bank. One of your jobs is to keep all systems patched. How might you ensure that system patches are kept up to date? Answers: Patch any time you receive a vendor notification of a new patch. Use periodic scheduled patching Use an automated patching system. Patch whenever a new threat is announced

Selected Answer: Use an automated patching system.


Set pelajaran terkait

Medical Cond in Preg Part I HTN GDM

View Set

Udemy Practice Test 4 Corrections

View Set

Medida y cambio del comportamiento Primera Parte. Capítulo 2.

View Set

Ch 15. The Automnic Nervous System and Visceral Reflexes (A&P 1-connect)

View Set