CORRECT ANSWERS
Authentication is the proof or verification of a user's identity before granting access to a
secured area. - Answer- True
Nonrepudiation is the security principle that prevents a user from being able to deny
having performed an action. - Answer- True
Authorization is also known as access control. - Answer- True
The User Domain of an IT infrastructure refers to actual users, whether they are
employees, consultants, contractors, or other third-party users. - Answer- True
The LAN Domain of an IT infrastructure includes routers, firewalls, and switches. -
Answer- False
The WAN Domain of an IT infrastructure includes networks owned by a telco or a carrier
network company that leases access to corporations. - Answer- True
In any organization, network administrators have the ultimate and final responsibility for
security. - Answer- False
Wireless networks are more secure than wired networks. - Answer- False
Information leakage often stems from malicious employees. - Answer- True
Zero-day exploits are new and previously unknown attacks for which no current specific
defenses exist. - Answer- True
Whitelisting blocks the execution of any program not on the approved list. - Answer-
True
A Media Access Control (MAC) address is the 48-bit physical hardware address of a
network interface card (NIC) assigned by the manufacturer. - Answer- True
Hardening is the process of securing or locking down a host against threats and attacks.
- Answer- True