• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back

Spyware, adware and DDOS agents are three types of:

Trojans

With application level firewalls, any access that has not been disabled is permitted.

False

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console.

True

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

risk assessment

Which of the following is not true about one-time passwords?

They create a packet level firewall on the system

Researchers estimate that only one or two new viruses are developed every week.

False

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.

threat

The key principle in preventing disruption, destruction and disaster is ___________.

redundancy

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.

firewall

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.

True

Which of the following type of media is least susceptible to eavesdropping?

fiber optics

Which of the following is not a type of intrusion prevention system?

data link-based

The most common authentication protocol used today is Kerberos.

True

Crackers are casual hackers with a limited knowledge of computer security.

False

__________ provide authentication which can legally prove who sent a message over a network.

Digital signatures

To snare intruders, many organizations now use _________ techniques.

entrapment

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.

WLANs

The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.

True

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?

unlocked wiring closet for network devices

The use of hacking techniques to bring attention to a larger political or social goal is referred to as

hacktivism

Network cables are the easiest target for eavesdropping.

False

A brute force attack against an encryption system:

tries to gain access by trying every possible key

Controls are mechanisms that reduce or eliminate threats to network security.

True

IP Security Protocol:

sits between IP at the network layer and TCP/UDP at the transport layer

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.

False

A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000.

True

_________ controls stop a person from acting.

preventive

Which of the following are usually the first choice for eavesdropping?

Wireless LANs

DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages.

True

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.

NAT firewall

Which of the following is not considered one of the five most common business impacts?

Social

_______________ describes how an asset can be compromised by one specific threat.

Threat scenarios

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

We can calculate the relative ___________, by multiplying the impact score by the likelihood.

risk score

Confidentiality is not a threat to business continuity.

False

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks.

application level firewall

Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.

False

________ controls fix a trespass into the network.

corrective

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.

True

A fundamental technique to determine if an intrusion is in progress in a stable network is:

anomaly detection

A security hole is a bug that permits intrusion to a computer.

True

Developing _______ helps develop a secure network.

controls

Macro viruses can spread when an infected file is opened.

True

A tornado that eliminates a network control center would be an example of a natural __________

disaster

Asymmetric encryption uses the same key to encrypt and decrypt an message..

False

A(n) ____________, is an information system that is critical to the survival of an organization.

mission critical application

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall

True

Integrity is not a primary goal of security.

False

DES:

is a commonly used symmetric encryption algorithm that was developed in the mid-1970s

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.

True

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.

True

A symmetric encryption system has two parts: the key and the ____________.

algorithm

Fault-intolerant servers contain many redundant components to prevent failure.

False

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.

True

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks?

Delphi team member