Network Security Basics/Computer Security Test One
Dual-homed
Servers or computers that have two NIC cards, each connected to separate networks, are known as what type of computers?
VPN
If you wanted to connect 2 networks securely over the internet, what type of technology could you use?
USB
To prevent files from being copied on a workstation to removable media, you should disable which ports?
Firewalls
Which of the following devices are the first line of defense for networks connected to the internet?
111
Which port should be closed on systems to prevent the unauthorized running of programs?
XaaS
Which of the following is NOT one of the three cloud service models recognized by the NIST?
Logging the event
Which of the following is a passive method of threat response?
Type II
Which hypervisor model needs the operating system to be up and cannot boot until it is?
EAL 4
Which of the following Evaluation Assurance Levels (EAL) is the common security benchmark for commercial systems?
80
What TCP port does HTTP use?
ICMP
Which of the following is NOT a routing protocol?
10/100 Mode
In order to run "sniffer" software property, the NIC in the computer running the software must be set to this.
packet filter
A firewall operating as _______ firewall will pass or block packets based on their application or TCP port number.
Application
According to the TCP/IP model, HTTP functions at which layer?
Host-to-Host
The TCP protocol functions at which layer of the TCP/IP model?
Intrusion detection system
These are used to monitor a network for suspect activity.
Honey Pot
This is a system designed to fool attackers into thinking a system is unsecured so they will attack it. Then the "victim" will learn their attack methods without compromising a live system.
WTLS
This is the security layer for wireless 802.11 connections using WAP.
23
What TCP port does Telnet use?
Less than $1000
What would the Annualized Loss Occurrence be for the asset in Question 6 if a fire that might damage the press in that manner occurred once every 15 years?
DAC
Which access control method model allows the owner of a resource to grant privileges to information they own?
RBAC
Which access control method model grants rights or privileges based on their job function or position held?
MAC
Which access control model is a static model that uses preddefined access privileges for resources that are assigned by the administrator?
Kerberos
Which authentication method uses a Key Distribution Center (KCD)?
EAL 1
Which of the following Evaluation Assurance Levels (EAL) specifies that the user wants assurance that the system will operate correctly, but threats to security are not viewed as serious?
Unlisted
Which of the following is NOT one of the cloud delivery models recognized by NIST?
TACACS+
Which remote access protocol; implemented almost exclusively by Cisco, is a central server providing remote access usernames that dial-up users can use for authentication.
Evil twin
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?
Mitigation
Which type of strategy is undertaken when you attempt to reduce the risk?
Transference
You have taken out an insurance policy on your data/systems to share some of the risk with another entity. What type of risk strategy is this?