True/False Indicate whether the
statement is true or false.
|
|
1.
|
Human errors, ignorance, and omissions cause more than half of all security
breaches sustained by networks.
|
|
2.
|
Network security is more often compromised “from the inside” than
from external sources.
|
|
3.
|
A security policy should state exactly which hardware, software, architecture,
or protocols will be used to ensure security.
|
|
4.
|
Encryption is the last means of defense against data theft.
|
|
5.
|
By default, the 802.11 standard offers substantial security.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
____ is a social engineering practice in which a person attempts to glean access
or authentication information by posing as someone who needs that information.
a. | Cracking | c. | War driving | b. | Hacking | d. | Phishing |
|
|
2.
|
In a ____ attack, a person redirects or captures secure transmissions as they
occur.
a. | denial-of service | c. | war driving | b. | man-in-the-middle | d. | phishing |
|
|
3.
|
____ software searches a node for open ports.
a. | Phishing | c. | Authentication | b. | Sniffing | d. | Port scanner |
|
|
4.
|
A router that is not configured to drop packets that match certain or suspicious
characteristics is an example of a risk associated with ____.
a. | people | c. | protocols and software | b. | transmission and
hardware | d. | Internet
access |
|
|
5.
|
A NOS that contains a “back door”is an example of a risk associated
with ____.
a. | people | c. | protocols and software | b. | transmission and
hardware | d. | Internet
access |
|
|
6.
|
A ____ attack occurs when an Internet chat user sends commands to a
victim’s machine that causes the screen to fill with garbage characters and requires the victim
to terminate their chat sessions.
a. | flashing | c. | war driving | b. | denial-of-service | d. | phishing |
|
|
7.
|
A ____ attack occurs when a system becomes unable to function because it has
inundated with requests for services and can’t respond to any of them.
a. | flashing | c. | war driving | b. | denial-of-service | d. | phishing |
|
|
8.
|
A ____ main function is to examine packets and determine where to direct them
based on their Network layer addressing information.
a. | switch’s | c. | router’s | b. | gateway’s | d. | proxy
server’s |
|
|
9.
|
A ____ firewall is a router (or a computer installed with software that enables
it to act as a router) that examines the header of every packet of data it receives to determine
whether that type of packet is authorized to continue to its destination.
a. | packet-filtering | c. | proxy | b. | gateway | d. | selective |
|
|
10.
|
A ____ attack occurs when a hacker uses programs that try a combination of a
user ID and every word in a dictionary to gain access to the network.
a. | flashing | c. | dictionary | b. | denial-of-service | d. | brute force |
|
|
11.
|
A ____ attack occurs when a hacker tries numerous possible character
combinations to find the key that will decrypt encrypted data.
a. | flashing | c. | dictionary | b. | denial-of-service | d. | brute force |
|
|
12.
|
The combination of a public key and a private key is known as a ____.
a. | key lock | c. | key pair | b. | key frame | d. | key set |
|
|
13.
|
A(n) ____ is a password-protected and encrypted file that holds an
individual’s identification information, including a public key.
a. | digital certificate | c. | access control list | b. | authentication file | d. | authentication
certificate |
|
|
14.
|
The use of certificate authorities to associate public keys with certain users
is known as ____.
|
|
15.
|
____ is a public key encryption system that can verify the authenticity of an
e-mail sender and encrypt e-mail data in transmission.
|
|
16.
|
____ is a method of encrypting TCP/IP transmissions above the network
layer.
|
|
17.
|
In ____, a hacker forges name server records to falsify his host’s
identity.
a. | IP spoofing | c. | ID spoofing | b. | DNS spoofing | d. | DHCP spoofing |
|
|
18.
|
A VPN ____ authenticates VPN clients and establishes tunnels for VPN
connections.
a. | router | c. | concentrator | b. | service | d. | certificate
authority |
|
|
19.
|
____ protocols are the rules that computers follow to accomplish
authentication.
a. | Access | c. | Authority | b. | Availability | d. | Authentication |
|
|
20.
|
RADIUS and TACACS belong to a category of protocols known as AAA (____).
a. | access, authorization, and accounting | b. | authentication, authorization, and
accounting | c. | authentication, authorization, and authority | d. | authentication,
authorization, and access |
|
|
21.
|
In ____, both computers verify the credentials of the other.
a. | mutual authorization | c. | mutual authentication | b. | mutual
access | d. | mutual
verification |
|
Completion Complete each
statement.
|
|
1.
|
A(n) ____________________ is a thorough examination of each aspect of the
network to determine how it might be compromised.
|
|
2.
|
A(n) ____________________ identifies an organization’s security risks,
levels of authority, designated security coordinator and team members, responsibilities for each team
member, and responsibilities for each employee.
|
|
3.
|
In general, information is ____________________ if it could be used by other
parties to impair an organization’s functioning, decrease customers’ confidence, cause a
financial loss, damage an organization’s status, or give a significant advantage to a
competitor.
|
|
4.
|
A(n) ____________________ is a software application on a network host that acts
as an intermediary between the external and internal networks, screening all incoming and outgoing
traffic.
|
|
5.
|
____________________ is the use of an algorithm to scramble data into a format
that can be read only by reversing the algorithm.
|
Matching
|
|
|
Match each item with a statement below: a. | IPS | f. | proxy server | b. | IDS | g. | proxy
service | c. | content filtering | h. | public key encryption | d. | HIDS | i. | private key encryption | e. | stateful |
|
|
1.
|
A firewall that can view a data stream.
|
|
2.
|
A software application on a network host that acts as an intermediary between
the external and internal networks, screening all incoming and outgoing traffic.
|
|
3.
|
Software that can only detect and log suspicious activity.
|
|
4.
|
A firewall that protects only the computer on which it is installed.
|
|
5.
|
Data is encrypted using two keys.
|
|
6.
|
A firewall that can block designated types of traffic based on application data
contained within packets.
|
|
7.
|
Software that can react to suspicious activity.
|
|
8.
|
Data is encrypted using a single key.
|
|
9.
|
The host that runs the proxy service.
|
Short Answer
|
|
1.
|
Describe who should conduct a security audit and the advantages of doing so, if
any.
|
|
2.
|
Explain how to block traffic attempting to exit a LAN and discuss why an
administrator would want to do this.
|
|
3.
|
Define SSH (secure shell) and explain the threats it guards against. Include an
explanation of the encryption algorithms that may be used with it.
|
|
4.
|
Describe the SCP (Secure CoPy) utility.
|
|
5.
|
Describe the two phases IPSec use to accomplish authentication.
|
|
6.
|
Define and describe PAP.
|
|
7.
|
Describe one potential flaw in CHAP and MS-CHAP authentication and explain how
it is resolved.
|
|
8.
|
Describe the three-way handshake used in CHAP.
|
|
9.
|
Describe an advantage of using EAP.
|
|
10.
|
Describe what distinguishes 802.1x from other authentication standards.
|