• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back

A security policy should clearly state the desired rules, even if they cannot be enforced..

False

You don’t need to physically secure your servers as long as you use a good strong password for your accounts.

False

In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions

True

A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.

False

A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.

Truwe

The ultimate goal of network security is to protect which of the following?

ALL THE ABOVE (customers who use the system,organization and its employees,business partners who access the network)

What is a policy that defines the methods involved when a user logs on to the network called?

Authentication

Which of the following should not be a concern when discerning the level of security that is required in a network?

How difficult it would be to enforce a password policy

In Windows 7, what is the maximum length that a password can be?

128

If the minimum password length on a Windows system is set to zero, what does that mean?

The user can use a blank password

Which one of the following passwords meets Windows password complexity requirement?

N3tworking1O1

Which protocol is used to encrypt data as it travels a network?

IPSec

Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

Preshared Key

When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?

USB key mode

f you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?

Network policy and access services

Which VPN implementation needs no additional configuration to be allowed access through a firewall

SSTP (Secure Socket Tunneling Protocol)

What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?

NAT

What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?

Malware

What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?

RootKIts

Which of the following is a type of malware that isn’t self-replicating and is usually installed by the user without his knowledge. It’s primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.

Spyware

The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?

WPA2

Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?

Port Scanner

Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?

Smurf Attack

Which of the following can be used to secure data on disk drives? (Choose all that apply.

EFS, Bitlocker, truecrypt

Firewall rules can be based on which of the following properties? (Choose all that apply.)

OS, Context, protocol

How the network resources are to be used should be clearly defined in a (an) ____________ policy.

Acceptable USe

In Linux, passwords are stored in an encrypted format in the ____________ file, which is located in the /etc directory.

shadow

____________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator

Kerberos

____________ is a free open-source product that can be used to encrypt the contents of an entire drive.

True Crypt

A(an) ____________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect

Rookit

software designed to cause harm or corruption

Malware

-spreads by replicating itself into programs or documents

Virus

--monopolizes network services or network bandwidth

denial of service (DOS)

packets are denied on context as well as packet properties

Firewall

--unsolicited email

Spam

masquerades as a useful program

Trojan

a self-contained, self-replicating program

Worm

inspects packets as they go into and out of the network

Stateful packet inspection

-used to discover breaches in security

IDS (Intrustion Detection System)

permits access to computer, bypassing normal authentication

Backdoor

What is a network security policy?

A network security policy defines the rules that apply to all users accessing the network. It includes how they are given access, what they can do once they have access, and what will happen if they don’t follow the rules.

Briefly describe the three levels of network security policies.

A highly restrictive security policy is the most secure. It makes use of data encryption, complex passwords, auditing and monitoring of all network access, advanced authentication methods, and strict usage policies.

A moderately restrictive security policy includes the use of passwords but not necessarily complex ones. It audits the network but usually only for unauthorized access and misuse of resources.
An open security policy might use passwords, but they would be simple. Network access is usually not monitored and available to all users.

How should a room that is going to house your servers be equipped?

A server room should have a locked door to limit access. It should also have adequate power receptacles, a cooling system, and there should be no sources of EMI to interfere with the network.

What are the complexity requirements for a Windows password? List the four characteristics.

For a password to be complex, it must contain three of the four characteristics. The four characteristics are uppercase letters, lowercase letters, numerals, and special characters.

What is a VPN?

A connection across a public network that uses encryption to ensure the communication is privte and secure

A firewall can be implemented in two different ways. What are they?

a firewall can be a software program installed in a OS. Second a firewall can be a hardware device which is usually a router

What is an IDS

An IDS is similar to a firewall but it tries to detect security breaches before they happen

What is the difference between a virus and a worm?

virus attaches itself to another program where as the worm is a self contained program

what is a penetration tester?

a person skilled in breaking into a network to find where the network is vulnerable for the purpose of advising a company how to be more secure

Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.

Protocol analyzers can capture packets including the data contained in them. They can be used to capture authentication info.