True/False
Indicate whether the sentence or statement is true
or false.
|
|
1.
|
The
introduction of firewalls in 1995 allowed successful businesses to balance security with simple
outbound access to the Internet.
|
|
2.
|
Identity theft is a crime in which one person masquerades under the identity of
another.
|
|
3.
|
Availability is defined as the continuous operation of computing
systems.
|
|
4.
|
The
FBI estimates every year U.S. companies lose up to $100 billion in business profits because of
information theft.
|
|
5.
|
An
intrusion detection system (IDS) provides 24/7 network surveillance.
|
Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
6.
|
What
are the connections called that transmit and receive data using radio frequencies or RF
connections? a. | Broadband | c. | Denial-of-Service Attacks | b. | Wireless Access | d. | TCP/IP | | | | |
|
|
7.
|
Which
of the following computer and network technologies have intrinsic security
weaknesses? a. | TCP/IP | c. | Network
Equipment | b. | Operating Systems | d. | All of the Above | | | | |
|
|
8.
|
Which
of the following weaknesses can cause security problems? a. | Installations
that follow policy | c. | Lack of a
written security policy | b. | Minimal turnover of staff | d. | A disaster recover plan | | | | |
|
|
9.
|
What
is an example of concise access controls that are not applied? a. | Using
"Cisco" as the password on a Cisco router | b. | Changing network
logons every 90 days | c. | Forcing user passwords contain at least one
number | d. | All of the above | | |
|
|
10.
|
An
example of a disgruntled employee would be one who as been: a. | Fired | c. | Reprimanded | b. | Laid off | d. | All of the above | | | | |
|
|
11.
|
Which
of the following is (are) incorrect about firewalls? a. | Restricts access
to specific network resources | b. | Contains built-in filters | c. | Creates a
protective layer between the network and the outside world | d. | Is a hardware
only solution | | |
|
|
12.
|
Examples of access controls might be: a. | Smartcards | c. | Security
token | b. | PINs | d. | All of the above | | | | |
|
|
13.
|
An
unauthorized access to a network is called a(n): a. | Authentication | c. | Encryption | b. | Confidentiality | d. | Threat | | | | |
|
|
14.
|
The
purpose of network security is to: a. | Keep the good guys in | c. | Protect your assets | b. | Keep the bad
guys out | d. | Both B and
C | | | | |
|
|
15.
|
A
program for exposing usernames and passwords is called a(n): a. | Virus | c. | Trojan
Horse | b. | Sniffer | d. | SNMP | | | | |
|
|
16.
|
What
does network security encompass? a. | Securing data | c. | Securing users | b. | Securing
applications | d. | All of the
above | | | | |
|
|
17.
|
Controlling access to critical network applications, data, and services is called
: a. | Security
assessment | c. | Perimeter
security | b. | Access control | d. | Encryption | | | | |
|
|
18.
|
A
crime in which one person masquerades under the identity of another is called: a. | Identity
theft | c. | Confidentiality | b. | Integrity | d. | All of the above | | | | |
|
|
19.
|
A
destructive program that masquerades as a benign application is called a(n): a. | Virus | c. | Sniffer | b. | Trojan horse | d. | Both A and B | | | | |
|
|
20.
|
The
firewall can be augmented by which of the following methods: a. | Intrusion
detection | c. | Vulnerability
assessment | b. | Authentication | d. | All of the above | | | | |
|
|
21.
|
If a
computer system is down for any period of time, it might cause: a. | Lack of
credibility | c. | Lost
revenues | b. | Lower customer satisfaction | d. | All of the above | | | | |
|
|
22.
|
What
is one of the goals of security? a. | Limit confidentiality | c. | Assure availability | b. | Increase system
downtime | d. | Reduce
integrity | | | | |
|
|
23.
|
Which
of the following is not a primary cause of network security threats? a. | Human
Error | c. | Policy
Weaknesses | b. | Encryption | d. | Configuration Weaknesses | | | | |
|
|
24.
|
Company proprietary information that is sensitive in nature also needs to
remain: a. | Confidential | c. | Unsafe | b. | Widely available | d. | Unsecure | | | | |
|
Matching
|
|
|
Please match the best term from the list below to the most appropriate
question. a. | Snoops | e. | Firewalls | b. | Privacy | f. | Availability | c. | Confidentiality | g. | Integrity | d. | Identity Theft | h. | Encryption | | | | |
|
|
25.
|
Protection of data from unauthorized disclosure to a third party.
|
|
26.
|
Where
one person masquerades under the identity of another.
|
|
27.
|
Ensures messages cannot be intercepted or read by anyone other than their intended
audience.
|
|
28.
|
Main
focus for organization that have had to expend considerable effort to respond to the new requirements
imposed by recent legislation.
|
|
29.
|
Individuals who take part in corporate espionage by gaining unauthorized access to
confidential data and providing this data to others.
|
|
|
Please match the best term from the list below to the most appropriate
question. a. | Ignorance | b. | Trojan Horse | c. | Intrusion
Detection System | d. | Extranet | e. | Denial-of-Service Attacks | f. | Authenticate | g. | TCP/IP | h. | Sniffers | | |
|
|
30.
|
Provides 24/7 network surveillance.
|
|
31.
|
Engulfs network equipment with useless noise which can slow down or crash a
system.
|
|
32.
|
Delivery vehicle for destructive code.
|
|
33.
|
Program for monitoring network activity.
|
|
34.
|
Security method based on the idea that each individual user has unique information
that sets them apart from others.
|