• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.

True
False
True
Network security is more often compromised “from the inside” than from external sources.

True
False
True
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.

True
False
False
Encryption is the last means of defense against data theft.

True
False
True
By default, the 802.11 standard offers substantial security.

True
False
False
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

a) Cracking
b) Hacking
c) War driving
d) Phishing
d) phishing
____ software searches a node for open ports.

a) Phishing
b) Sniffing
c) Authentication
d) Port scanner
d) port scanner
In a ____ attack, a person redirects or captures secure transmissions as they occur.

a. denial-of service
b. man-in-the-middle
c. war driving
d. phishing
b) man in the middle
A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.

a) people
b) transmission and hardware
c) protocols and software
d) Internet access
b) transmission and hardware
A NOS that contains a “back door”is an example of a risk associated with ____.

a) people
b) transmission and hardware
c) protocols and software
d) Internet access
c) protocols and software
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

a. flashing
b. denial-of-service
c. war driving
d. phishing
a) flashing
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.

a) flashing
b) denial-of-service
c) war driving
d) phishing
b) denial of service
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

a. switch
b. gateway
c. router
d. proxy server
c) router
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

a. packet-filtering
b. gateway
c. proxy
d. selective
a) packet filtering
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

a) flashing
b) denial-of-service
c) dictionary
d) brute force
c) dictionary
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.

a) flashing
b) denial-of-service
c) dictionary
d) brute force
d) brute force
The combination of a public key and a private key is known as a ____.

a) key lock
b) key frame
c) key pair
d) key set
c) key pair
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.

a) digital certificate
b) authentication file
c) access control list
d) authentication certificate
a) digital certificate
The use of certificate authorities to associate public keys with certain users is known as ____.

a) PGP
b) PKI
c) IPSec
d) SSL
b) PKI
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.

a. PGP
b. SSH
c. IPSec
d. SSL
a) PGP