Strata 10 Review

Is this your test? Login to manage it. If not, you can develop a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
____is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission
2.
1 point
____is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network
3.
1 point
In____, a hacker forges name server records to falsify his host's identity
4.
1 point
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
5.
1 point
A____attack occurs when a system becomes unable to function because it has inundated with requests for services and can't respond to any of them.
6.
1 point
A program that disguises itself as something useful but actually harms your system is called____
7.
1 point
____is intended to eliminate single points of failure
8.
1 point
____is a method of encrypting TCP/IP transmissions above the network layer
9.
1 point
A____attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network
10.
1 point
In____, both computers verify the credentials of the other
11.
1 point
A(n)____is a password-protected and encrypted file that holds an individual's identification information, including a public key
12.
1 point
____scanning detects malware by comparing a file's content with known malware signatures in a signature database
13.
1 point
A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with____.
14.
1 point
____is an automatic distribution of traffic over multiple links or processors is used to optimize response
15.
1 point
The goal of fault-tolerant systems is to prevent failures from progressing to faults
16.
1 point
A____firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
17.
1 point
A(n)____virus disguises itself as a legitimate program to prevent detection
18.
1 point
When implementing anti-malware software on a network, one of your most important decisions is where to install the software
19.
1 point
____is a fault-tolerance technique that links multiple servers together to act as a single server
20.
1 point
RADIUS and TACACS belong to a category of protocols known as AAA (____).
21.
1 point
A____main function is to examine packets and determine where to direct them based on their Network layer addressing information
22.
1 point
____scanning techniques attempt to identify malware by discovering "malware-like" behavior
23.
1 point
A(n)____UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery
24.
1 point
Power that is free from noise is called "____" power
25.
1 point
By default, the 802.11 standard offers substantial security
26.
1 point
Generators provide surge protection
27.
1 point
Encryption is the last means of defense against data theft
28.
1 point
____Web sites are locations on the internet that dynamically duplicate other locations on the Internet, to ensure their continual availability
29.
1 point
The combination of a public key and a private key is known as a____
30.
1 point
____is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information
31.
1 point
A____attack occurs when an internet chat user sends commands to a victim's machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat session.
32.
1 point
A(n)____is a deviation from a specified level of system performance for a given period of time.
33.
1 point
The use of certificate authorities to associate public keys with certain users is known as____
34.
1 point
In a ____attack, a person redirects or captures secure transmissions as they occur
35.
1 point
____detects malware by comparing current characteristics of files and disks against an archives version of these characteristics to discover any changes
36.
1 point
Protection against harmful code involves more than just installing anti-malware software
37.
1 point
____are distinct networks of storage devices that communicate directly with each other and with other networks
38.
1 point
A____attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data
39.
1 point
A____is a program that runs automatically, without requiring a person to start or stop it
40.
1 point
____are programs that run independently and travel between computers and across networks
41.
1 point
An anti-malware policy is meant to protect the network from damage and downtime
42.
1 point
A group of hard disks is called a____
43.
1 point
A VPN____authenticates VPN clients and established tunnels for VPN connections
44.
1 point
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks
45.
1 point
____software searches a node for open ports
46.
1 point
A(n)____virus changes its characteristics every time it is transferred to a new system
47.
1 point
A NOS that contains a "back door" is an example of a risk associated with____.
48.
1 point
____protocols are the rules that computers follow to accomplish authentication
49.
1 point
Network security is more often compromised "from the inside" than from external sources
50.
1 point
Mesh topologies and____topologies are good choices for highly available enterprise networks.