• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back
Protocol used to send all Internet Mail.
SMTP
The Melissa virus is an example of this type of attack.
E-mail Virus
Used to capture data or passwords as they cross the network.
packet sniffer
In this type of attack, the intruder intercepts traffic flowing from one person to another and pretends to be the other party.
man-in-the-middle
This type of model has very few layers of bureaucracy between the top and the bottom of the organization.
a. hierarchical and centralized model
b. non-hierarchial and decentralized model
b. non-hierarchial and decentralized
Most large corporations subscribe to this model.
a. hybid model
b. hierarchical and centralized model
b. hierarchical and centralized model
This is the most prevalent type of company management.
a. hierarchical and centralized model
b. hybrid model
b. hybrid model
In this model the corporation is organized around projects and products.
a. Network authentication
b. Team model
b. Team Model
A small company in which the owner makes all decisions and doesn't delegate management tasks would most closely illustrate this model.
a. non-hierarchical and centralized model
b. hierarchical and centralized
a. non-hierarchical and centralized model
In this model, all the planning is done at the top of the organization, and the lower levels of the organization are expected to follow only directives from the top.
a. Team Model
b.hierarchical and centralized model
b. hierarchical and centralized model
During this process, the user is allowed or denied access to specific network services based upon permissions applied.
a. Authentication Services
b. Network authentication
b. Network authentication
In the Windows 2000 implementation of Kerberos, this is typically the domain controller that stores the directory database containing all users and passwords.
a. Ticket Granting Service
b. Public Key Infrastructure
c. Key Distribution Center
c. Key Distribution Center
In the Windows 2000 implentation of Kerberos, this service issues Session Tickets for access to network resources.
a. Ticket Granting Service
b. Public Key Infrastructure
a. Ticket Granting Service
The First step in securing network resources.
a. Authentication Service
b. NTLM authentication
c. User Authentication
c. User Authentication
Used to set up certificate-based authentication.
a. User Authentication
b. Public Key Infrastructure
b. Public Key Infrastructure
In the Windows 2000 implementation of Kerberos, this service issues Ticket Granting Tickets to users.
a. Ticket Granting Service
b. Key Distribution Center
c. Authentication Service
c. Authentication Service
During this process the user logs onto, and is authenticated by, either a local computer or a domain controller.
a. Authenticated user
b. NTLM authentication
c. Interactive Logon
c. Interactive Logon
The Authentication protocol used by a down-level client such as Windows NT when authenticating a user on a Windows 2000 network.
a. NTLM authentication
b. Authentication Service
c. User Authentication
a. NTLM authentication
Contains the file encryption key that the recovery agent can use to decrypt the data if necessary.
a. Data Recovery
b. Data Recovery Field
b. Data Recovery Field
Which is not true about designing a corporate security plan?
a. It includes designing secure access to services on the network.
b. It has to ensure that those people who need access to information can get the right level of access.
c. It has to prevent unauthorized people from accessing data.
d. None of the above.
d. None of the above.
A corportation with high tolerance for risk is not characterized by _____.
a. starting businesses that are similar to the current business
b. frequent startups of new companies
c. aggressive mergers
d. Both A and B
a. starting businesses that are similar to the current business
In which company would you be least likely to find decentralized network administration?
a. A medium-sized company with several thousand users, most of whom are located at a corporate head office with several small branch offices.
b. A large corporation with multiple locations and thousands of users in each location.
c. A corporation that has merged with other companies, and each company remains fairly autonomous.
d. Both A and B
a. A medium-sized company with several thousand users, most of whom are located at a corporate head office with several small branch offices.
A corporation that gives considerable authority to each location or business unit to manage their own network, while centralizing some services, is exhibiting the ______ network administration model.
a. distributed
b. hybrid
c. team
d. outsourcing
b. hybrid
In which situation would the NTLM protocol not be used?
a. A Windows 2000 computer authenticates to a Windows NT-based server.
b. A logon request is sent to a Windows 2000 standalone server.
c. Authentication to a Windows 2000 Cluster Server environment is required.
d. None of the above.
d. None of the above.