Final-Exam-NetSec

Is this your test? Login to manage it. If not, you can make an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
In information security a(n) __________ is the likelihood that a threat agent will exploit a vulnerability.
2.
1 point
A threat agent __________.
3.
1 point
Each of the following is a convergence security vulnerability except __________.
4.
1 point
__________ are a loose-knit network of attackers, identity thieves, and financial fraudsters.
5.
1 point
Which of the following is not an approach to trust?
6.
1 point
A __________ is a collection of suggestions that should be implemented.
7.
1 point
__________ attacks come from multiple sources instead of a single source.
8.
1 point
__________ ensures that only authorized parties can view the information.
9.
1 point
__________ is a systematic and structured approach to managing the potential for loss that is related to a threat.
10.
1 point
A firewall using __________ is the most secure type of firewall.
11.
1 point
Which of the following is not true regarding TCP SYN port scanning?
12.
1 point
A __________ attack takes advantage of vulnerabilities that have not been previously revealed.
13.
1 point
The term __________ is commonly used in a generic sense to identify anyone who illegally breaks into a computer system
14.
1 point
A honeypot is used for each of the following except __________.
15.
1 point
A protocol analyzer places the computer’s network interface card (NIC) adapter into __________ mode
16.
1 point
The __________ establishes the action that a firewall takes on a packet.
17.
1 point
The principle known as __________ in access control means that each user should only be given the minimal amount of privileges necessary for that person to perform their job function.
18.
1 point
The amendment to add 5.5 Mbps and 11 Mbps to the IEEE 802.11 standard is __________.
19.
1 point
Another name for a packet filter is a __________.
20.
1 point
If a device is determined to have an out-of-date virus signature file then Network Access Control (NAC) can redirect that device to a network by __________.
21.
1 point
Each of the following is a goal of information security except __________.
22.
1 point
Separate __________ can be used to support low-security guest Internet access and high security administrators on the same access point.
23.
1 point
A process functioning on behalf of the user that attempts to access a file is known as a(n) __________.
24.
1 point
A user entering her username would correspond to the __________ action in access control.
25.
1 point
Which of the following is NOT a password policy defense against an attacker stealing a Windows password file?
26.
1 point
An example of a(n) __________ is a software defect in an operating system that allows an unauthorized user to gain access to a computer without a password.
27.
1 point
A virtual LAN (VLAN) allows devices to be grouped __________.
28.
1 point
Each of the following is a successive layer in which information security is achieved except __________.
29.
1 point
The Service Set Identifier (SSID) __________.
30.
1 point
A(n) __________ intercepts internal user requests and then processes that request on behalf
of the user.
31.
1 point
Each of the following is a reason why it is difficult to defend against today’s attackers except __________.
32.
1 point
Access to the wireless network can be restricted by __________.
33.
1 point
Each of the following is a state of a port that can be returned by a port scanner except __________.
34.
1 point
Subnetting __________.
35.
1 point
A __________ watches for attacks but only takes limited action when one occurs.