True/False
Indicate whether the sentence or statement is true
or false.
|
|
1.
|
It is
extremely important for system administrator to protect the integrity and availability of operating
systems from outside threats.
|
|
2.
|
Subscriptions to mailing lists can enable administrators to receive important
security-related announcements and keep up with new developments and updates specific to their
systems.
|
|
3.
|
It is
important to make sure the new installations are compatible with planned upgrades.
|
|
4.
|
Generally speaking, firmware is programming that is inserted into programmable random
access memory (programmable RAM), thus becoming a permanent part of a computing device.
|
|
5.
|
An
organization's network security policy should require that the routing configuration of a firewall
system be performed in an environment that includes the organization's production
network.
|
Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
6.
|
A
file in a format that the computer can directly run is called a(n): a. | source
file | c. | executable
file | b. | object
file | d. | run
file | | | | |
|
|
7.
|
A
file that is computer-readable but not human-readable format is called a(n): a. | binary
file | c. | text
file | b. | source
file | d. | All of the
above | | | | |
|
|
8.
|
What
is used by a company that wants to host its own Internet services without sacrificing unauthorized
access to its private network?
|
|
9.
|
What
is the central module of an operating system called? a. | core | c. | interface | b. | kernel | d. | plug-in | | | | |
|
|
10.
|
As it
relates to packet information, the information contained within the packet itself is
called: a. | intrinsic | c. | hardened | b. | extrinsic | d. | None of the above | | | | |
|
|
11.
|
What
is the series of notes about the Internet that began in 1969 called? a. | SMTP | c. | SNA | b. | RFC | d. | spoofing | | | | |
|
|
12.
|
What
is the protocol for sending e-mail messages between servers called?
|
|
13.
|
What
is a destructive program that masquerades as a benign application called? a. | spoofing | c. | smurf | b. | sniffing | d. | trojan horse | | | | |
|
|
14.
|
What
is the name of a worldwide bulletin board system that can be access through the Internet
called? a. | ICMP | c. | WWBBS | b. | USENET | d. | All of the above | | | | |
|
|
15.
|
What
is the name of the network attack that floods it with useless traffic? a. | virus | c. | DoS
attack | b. | trojan horse | d. | spoofing | | | | |
|
|
16.
|
What
is the name of the network security breach where it is swamped with replies to ICMP
requests? a. | virus
attack | c. | TLD
attack | b. | spoofing attack | d. | smurf attack | | | | |
|
|
17.
|
A new
standard that will enable secure credit card transactions on the Internet is called: a. | SSH | c. | SET | b. | S-HTTP | d. | None of the above | | | | |
|
|
18.
|
What
is the format for storing sound in files that was jointly developed by Microsoft and
IBM?
|
|
19.
|
A
computer network that spans a relatively large geographical area is called a(n): a. | LAN | c. | MAN | b. | WAN | d. | All of the above | | | | |
|
|
20.
|
A
hardware or software module that adds a specific feature or service to a larger system is called
a(n): a. | plug-in | c. | kernel | b. | operating system | d. | interface | | | | |
|
|
21.
|
What
performs basic tasks, such as recognizing input from the keyboard, sending output to the monitor, and
tracking files on disk? a. | plug-in | c. | SSH | b. | interface | d. | operating system | | | | |
|
|
22.
|
Built-in software that determines what a computer can do without accessing programs
from a disk is called:
|
|
23.
|
What
is the set of data called that informs a computer's operating system which permissions, or access
rights each user or group has to items such as directories and files? a. | ACL | c. | CGI | b. | BIOS | d. | None of the above | | | | |
|
|
24.
|
As it
pertains to packet information, the information that exists outside the packet is
called: a. | intrinsic | c. | DMZ | b. | extrinsic | d. | FTP | | | | |
|
|
25.
|
What
is the protocol called that is used on the Internet for sending files?
|
Matching
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | executable
file | e. | firewall | b. | daemon | f. | plug-in | c. | binary
file | g. | intrinsic | d. | hardened | h. | extrinsic | | | | |
|
|
26.
|
Process that runs specific operations in the background.
|
|
27.
|
Information that exists outside the packet.
|
|
28.
|
System designed to prevent unauthorized access to/from a private
network.
|
|
29.
|
Process of making application software secure by ensuring that it contains security
enabling technology.
|
|
30.
|
Hardware or software module that adds a specific feature or service to a larger
system.
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | kernel | e. | MIDI | b. | intrinsic | f. | WAV | c. | extrinsic | g. | trojan horse | d. | interface | h. | virus | | | | |
|
|
31.
|
Destructive program that masquerades as a benign application.
|
|
32.
|
Format for storing sound in files developed jointly by Microsoft and
IBM.
|
|
33.
|
Central module of an operating system.
|
|
34.
|
Boundary across which two independent system meet and communicate with each
other.
|
|
35.
|
Information contained within the packet itself.
|