Name: 
 

Chapter11



True/False
Indicate whether the statement is true or false.
 

 1. 

Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
 

 2. 

Network security is more often compromised “from the inside” than from external sources.
 

 3. 

A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
 

 4. 

Encryption is the last means of defense against data theft.
 

 5. 

By default, the 802.11 standard offers substantial security.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
a.
Cracking
c.
War driving
b.
Hacking
d.
Phishing
 

 2. 

In a ____ attack, a person redirects or captures secure transmissions as they occur.
a.
denial-of service
c.
war driving
b.
man-in-the-middle
d.
phishing
 

 3. 

____ software searches a node for open ports.
a.
Phishing
c.
Authentication
b.
Sniffing
d.
Port scanner
 

 4. 

A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.
a.
people
c.
protocols and software
b.
transmission and hardware
d.
Internet access
 

 5. 

A NOS that contains a “back door”is an example of a risk associated with ____.
a.
people
c.
protocols and software
b.
transmission and hardware
d.
Internet access
 

 6. 

A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
a.
flashing
c.
war driving
b.
denial-of-service
d.
phishing
 

 7. 

A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
a.
flashing
c.
war driving
b.
denial-of-service
d.
phishing
 

 8. 

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
a.
switch’s
c.
router’s
b.
gateway’s
d.
proxy server’s
 

 9. 

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
a.
packet-filtering
c.
proxy
b.
gateway
d.
selective
 

 10. 

A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
a.
flashing
c.
dictionary
b.
denial-of-service
d.
brute force
 

 11. 

A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
a.
flashing
c.
dictionary
b.
denial-of-service
d.
brute force
 

 12. 

The combination of a public key and a private key is known as a ____.
a.
key lock
c.
key pair
b.
key frame
d.
key set
 

 13. 

A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
a.
digital certificate
c.
access control list
b.
authentication file
d.
authentication certificate
 

 14. 

The use of certificate authorities to associate public keys with certain users is known as ____.
a.
PGP
c.
IPSec
b.
PKI
d.
SSL
 

 15. 

____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
a.
PGP
c.
IPSec
b.
SSH
d.
SSL
 

 16. 

____ is a method of encrypting TCP/IP transmissions above the network layer.
a.
PGP
c.
PAP
b.
IPSec
d.
SSL
 

 17. 

In ____, a hacker forges name server records to falsify his host’s identity.
a.
IP spoofing
c.
ID spoofing
b.
DNS spoofing
d.
DHCP spoofing
 

 18. 

A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
a.
router
c.
concentrator
b.
service
d.
certificate authority
 

 19. 

____ protocols are the rules that computers follow to accomplish authentication.
a.
Access
c.
Authority
b.
Availability
d.
Authentication
 

 20. 

RADIUS and TACACS belong to a category of protocols known as AAA (____).
a.
access, authorization, and accounting
b.
authentication, authorization, and accounting
c.
authentication, authorization, and authority
d.
authentication, authorization, and access
 

 21. 

In ____, both computers verify the credentials of the other.
a.
mutual authorization
c.
mutual authentication
b.
mutual access
d.
mutual verification
 

Completion
Complete each statement.
 

 1. 

A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
 

 

 2. 

A(n) ____________________ identifies an organization’s security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
 

 

 3. 

In general, information is ____________________ if it could be used by other parties to impair an organization’s functioning, decrease customers’ confidence, cause a financial loss, damage an organization’s status, or give a significant advantage to a competitor.
 

 

 4. 

A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
 

 

 5. 

____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
 

 

Matching
 
 
Match each item with a statement below:
a.
IPS
f.
proxy server
b.
IDS
g.
proxy service
c.
content filtering
h.
public key encryption
d.
HIDS
i.
private key encryption
e.
stateful
 

 1. 

A firewall that can view a data stream.
 

 2. 

A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
 

 3. 

Software that can only detect and log suspicious activity.
 

 4. 

A firewall that protects only the computer on which it is installed.
 

 5. 

Data is encrypted using two keys.
 

 6. 

A firewall that can block designated types of traffic based on application data contained within packets.
 

 7. 

Software that can react to suspicious activity.
 

 8. 

Data is encrypted using a single key.
 

 9. 

The host that runs the proxy service.
 

Short Answer
 

 1. 

Describe who should conduct a security audit and the advantages of doing so, if any.
 

 2. 

Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.
 

 3. 

Define SSH (secure shell) and explain the threats it guards against. Include an explanation of the encryption algorithms that may be used with it.
 

 4. 

Describe the SCP (Secure CoPy) utility.
 

 5. 

Describe the two phases IPSec use to accomplish authentication.
 

 6. 

Define and describe PAP.
 

 7. 

Describe one potential flaw in CHAP and MS-CHAP authentication and explain how it is resolved.
 

 8. 

Describe the three-way handshake used in CHAP.
 

 9. 

Describe an advantage of using EAP.
 

 10. 

Describe what distinguishes 802.1x from other authentication standards.
 



 
Check Your Work     Start Over