Quiz 1, 2

Ace your homework & exams now with Quizwiz!

___________________ is an attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.

Disassociation

Separation of duties polices are designed to reduce the risk of what? Group of answer choices

Fraud

Which remote access protocol, implemented almost exclusively by Cisco, is a central server providing remote access usernames that dial-up users can use for authentication.

TACACS+

To prevent files from being copied on a workstation to removable media, you should disable which ports?

USB

Whether your server operating system can force the change of a password is considered what kind of a security issue?

operational

A firewall operating as a ___________________ firewall will pass or block packets based on their application or TCP port number.

packet filter

Which of the following devices are the first line of defense for networks connected to the Internet?

firewalls

If SLE is calculated at $2,500 and there are an anticipated 4 occurrences a year (ARO), then ALE is:

10,000

A ___________________ is a system designed to fool attackers into thinking a system is unsecured so they will attack it. Then the "victim" will learn their attack methods without compromising a live system. Group of answer choices

Honey pot

Which of the following is not a routing protocol?

ICMP

Wireless Ethernet conforms to which IEEE standard?

IEEE 802.11

Which of the following is a series of standards that define procedures for implementing electronically secure industrial automation and control systems?

ISA/IEC-62443

A(n) ___________________ is a broad term that applies to a wide range of systems used to manage information security. Group of answer choices

ISMS

When assigning permissions to users, which principle should you adhere to?

Least privilege

Which of the following is a passive method of threat response? Group of answer choices

Logging the event

Which access control model is a static model that uses predefined access privileges for resources that are assigned by the administrator?

MAC

Which type of risk strategy is undertaken when you attempt to reduce the risk? Group of answer choices

Mitigation

When the entire network, including all security devices, is virtualized, this is known as:

SDN

Which authentication method uses a key distribution center (KCD)?

kerberos

Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?

evil twin


Related study sets

Middle Ages Quiz 1: Feudalism, The Church, and Medieval Life

View Set

Accounting Chapter 17 Learnsmart/Homework

View Set

DSM-5 Study Guide Questions and Answers

View Set

Unit 4 English Which sentence uses numbers correctly?

View Set

Chapter 11 - Stockholders' Equity

View Set

Fundamentals Criminal Law quiz 3

View Set