Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
True False |
True
|
|
Network security is more often compromised “from the inside” than from external sources.
True False |
True
|
|
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
True False |
False
|
|
Encryption is the last means of defense against data theft.
True False |
True
|
|
By default, the 802.11 standard offers substantial security.
True False |
False
|
|
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
a) Cracking b) Hacking c) War driving d) Phishing |
d) phishing
|
|
____ software searches a node for open ports.
a) Phishing b) Sniffing c) Authentication d) Port scanner |
d) port scanner
|
|
In a ____ attack, a person redirects or captures secure transmissions as they occur.
a. denial-of service b. man-in-the-middle c. war driving d. phishing |
b) man in the middle
|
|
A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.
a) people b) transmission and hardware c) protocols and software d) Internet access |
b) transmission and hardware
|
|
A NOS that contains a “back door”is an example of a risk associated with ____.
a) people b) transmission and hardware c) protocols and software d) Internet access |
c) protocols and software
|
|
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
a. flashing b. denial-of-service c. war driving d. phishing |
a) flashing
|
|
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
a) flashing b) denial-of-service c) war driving d) phishing |
b) denial of service
|
|
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
a. switch b. gateway c. router d. proxy server |
c) router
|
|
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
a. packet-filtering b. gateway c. proxy d. selective |
a) packet filtering
|
|
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
a) flashing b) denial-of-service c) dictionary d) brute force |
c) dictionary
|
|
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
a) flashing b) denial-of-service c) dictionary d) brute force |
d) brute force
|
|
The combination of a public key and a private key is known as a ____.
a) key lock b) key frame c) key pair d) key set |
c) key pair
|
|
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
a) digital certificate b) authentication file c) access control list d) authentication certificate |
a) digital certificate
|
|
The use of certificate authorities to associate public keys with certain users is known as ____.
a) PGP b) PKI c) IPSec d) SSL |
b) PKI
|
|
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
a. PGP b. SSH c. IPSec d. SSL |
a) PGP
|