MIS 140 CH 11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall. True False

True

A software solution to correct a security hole is often referred to as a patch or update. True False

True

A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization. True False

True

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. True False

True

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. True False

True

Disk mirroring writes duplicate copies of all data on at least two different disks. True False

True

Intrusion primarily refers to the loss of confidentiality of organizational data. True False

True

Macro viruses can spread when an infected file is opened. True False

True

The ideal solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network True False

True

Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN. True False

False

Corrective controls reveal or discover unwanted events. True False

False

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. True False

False

Decryption is the process of converting plaintext into ciphertext. True False

False

In transport mode, IPSec encrypts the entire IP packet. True False

False

Maintaining data integrity is not a primary goal of security. True False

False

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet. True False

True

A brute-force attack is a method of trying to guess the correct password by trying every possible key. True False

True

Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account. True False

True

Controls are mechanisms that reduce or eliminate threats to network security. True False

True

Preventive controls mitigate or stop a person from acting or an event from occurring. True False

True

Secure Sockets Layer is an encryption standard designed for use on the Web. True False

True

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. True False

True

The CERT was established at Carnegie Mellon University. True False

True

The most common access point used by attackers to gain access to an organization's network is the Internet connection. True False

True

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? a. Delphi team member b. script kiddies c. crackers d. professional hackers e. organization employees

a. Delphi team member

_______________ describes how an asset can be compromised by one specific threat. a. Threat scenarios b. Threat plans c. Threat hacks d. Threat contingencies e. Threat attacks

a. Threat scenarios

_______________ is an encryption standard that uses a total of 168 bits as the key. a. Triple DES b. Dial-back c. WEP d. EAP e. Ciphering

a. Triple DES

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming

a. denial-of-service attack

A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion

a. disaster

To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES

a. entrapment

Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable

a. fiber optics

Often, incidents of unauthorized access known as ___________, involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster 1

a. intrusion

A security hole is a(n): a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users b. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location c. packet-level firewall d. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution e. ANI system

a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they a. often have weaker security. b. have more assets. c. are more likely to have credit card numbers available. d. are likely off-shore. e. have lower bandwidth 1

a. often have weaker security.

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan

a. risk assessment

For Ethernet networks, a _______ switch can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming

a. secure

A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers. a. intranet b. DMZ c. zone of authority d. VLAN e. smart hub

b. DMZ

A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers. a. intranet b. DMZ c. zone of authority d. VLAN e/ smart hub

b. DMZ

A brute force attack against an encryption system: a. is called RC4 b. tries to gain access by trying every possible key c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard

b. tries to gain access by trying every possible key

A (n) ______ is a special type of virus that spreads itself without human intervention. a. snake b. worm c. Trojan horse d. boot sector virus e. stealth virus

b. worm

__________ refers to the process of translating between one set of private IP addresses inside a network and a set of public addresses outside the network. a. Translation b. Conversion c. Network Address Translation d. Proxy translation e. IP conversion.

c. Network Address Translation

Spyware, adware and DDOS agents are three types of: a. IP spoofing attacks b. Denial-of-service attacks c. Trojans d. Physical security threats e. Intrusion prevention detection approaches

c. Trojans

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaste

c. controlled chaos

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster

c. controlled chaos

________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup

c. detective

The use of hacking techniques to bring attention to a larger political or social goal is referred to as a. cracking b. ethical politics c. hacktivism d. social engineering e. brute force attacks

c. hacktivism

We can calculate the relative ___________, by multiplying the impact score by the likelihood. a. rootkit b. authentication c. risk score d. risk assessment e. risk event

c. risk score

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk

c. uninterruptible power supply

Which of the following is not considered one of the five most common business impacts? a. Financial b. Productivity c. Reputation d. Social e. Safety

d. Social

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board

d. certificate authority

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: a. Trojan horse b. sniffing c. tunneling d. computer forensics e. misuse detection 1

d. computer forensics

An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster

d. destruction

Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules

d. disguising information by the use of mathematical rules, known as algorithms

Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules

d. disguising information by the use of mathematical rules, known as algorithms

Which of the following is not a method for deterring intrusion? a. training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c. using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is 'idle' for a certain amount of time e. performing social engineering

e. performing social engineering

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? a. locked doors on all communication closets b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices

e. unlocked wiring closet for network devices


Set pelajaran terkait

History Unit 1 Assessment Questions

View Set

CCS Exam Prep Health Data Content and Standards

View Set

2019 Ninja PRITE Question Book (Part 1)

View Set

1-1 What is Science Section Assessment

View Set

Co-Occurring Disorders Final Study Guide

View Set

Homework: 3.2 Measures of Dispersion

View Set