COMPLETE
Tunneling is the act of transmitting a protocol across an intermediary network by
encapsulating it in another protocol. - ANSWER-True
Remote Access Server (RAS) is a network server that accepts outbound
connections from remote clients. - ANSWER-False
Which term describes an object, computer, program, piece of data, or other logical or
physical component you use in a business process to accomplish a business task? -
ANSWER-Asset
A domain is a form of networking in which each computer is a peer. - ANSWER-
False
A public IP address is any address that is valid for use on the Internet. - ANSWER-
True
When conducting an audit, the auditor should be which of the following? - ANSWER-
An external person who is independent of the organization under audit
Authentication confirms the identity of a user. - ANSWER-True
The IT department is the group that has the highest controlling and responsible
authority within an organization. Ultimately the success or failure of network security
rests with this department. - ANSWER-False
Which of the following characteristics relates to a demilitarized zone (DMZ)? -
ANSWER-A type of perimeter network used to host resources designated as
accessible by the public from the Internet
Which term is used to describe a network security device or host software that filters
communications, usually network traffic, based on a set of predefined rules? -
ANSWER-Firewall
Encryption is the process or mechanism that grants or denies use of a resource. -
ANSWER-False
Which of the following refers to a host on a network that supports user interaction
with the network? - ANSWER-Client
A chokepoint is a form of bottleneck and is a single, controlled pathway between two
different levels of network trust where a firewall or other filtering devices block or
allow traffic based on a set of rules. - ANSWER-True
,Which of the following describes authentication? - ANSWER-The process of
confirming the identity of a user
A security policy is important for all of the following reasons except which one? -
ANSWER-With it, you cannot trust the network's security.
Which term describes when a system is usable for its intended purpose? -
ANSWER-Availability
Which term is used to describe the process of encasing one protocol or packet inside
another protocol or packet? - ANSWER-Encapsulation
The term thin client computing refers to a legacy terminal concept used to control
mainframes. - ANSWER-True
Which term is used to describe a network service that maintains a searchable index
or database of network hosts and shared resources? - ANSWER-Directory Service
Which of the following terms refers to the process of securing or locking down a host
against threats and attacks? - ANSWER-Hardening
Caching is the retention of Internet content by a proxy server. - ANSWER-True
Which term is used to describe an attack that occurs when a hacker uses a network
sniffer to watch a communications session to learn its parameters? - ANSWER-
Hijacking
Intrusion Detection System (IDS) is a security mechanism that detects unauthorized
user activities, attacks, and network compromises. - ANSWER-True
Which of the following refers to filtering traffic as it attempts to leave a network,
which can include monitoring for spoofed addresses, malformed packets,
unauthorized ports and protocols, and blocked destinations? - ANSWER-Egress
filtering
Which of the following characteristics relates to access control? - ANSWER-The
process or mechanism of granting or denying use of resources; typically applied to
users or generic network traffic
Which name is given to the security service of preventing access to resources by
unauthorized users while supporting access to authorized users? - ANSWER-
Confidentiality
Which of the following is a malicious software program distributed by a hacker to
take control of a victim's computers? - ANSWER-Agent
Dynamic packet filtering uses a static or fixed set of rules to filter network traffic. -
ANSWER-False
, Which name is given to a probability prediction based on statistics and historical
occurrences on the likelihood of how many times in the next year a threat is going to
cause harm? - ANSWER-Annualized rate of occurrence (ARO)
Which name is given to a form of filtering that focuses on traffic content? - ANSWER-
Content filtering
Dynamic packet filtering is the process of automatically creating temporary filters. In
most cases, the filters allow outbound responses to previous inbound requests. -
ANSWER-False
A node is a network device responsible for directing traffic towards its stated
destination along the best-known current available path. - ANSWER-False
A replay attack occurs when a hacker uses a network sniffer to capture network
traffic and then retransmits that traffic back on to the network at a later time. -
ANSWER-True
Which of the following describes a blacklist? - ANSWER-A type of filtering in which
all activities or entities are permitted except those identified
IPv6 uses a 128-bit address, which is significantly smaller than IPv4. - ANSWER-
False
Which of the following describes caching? - ANSWER-Retention of Internet content
by a proxy server
Authorization protects the confidentiality, integrity, and availability of personally
identifiable or sensitive data. - ANSWER-False
Which of the following is the name given to unauthorized access to a system? -
ANSWER-Backdoor
A blacklist is a type of filtering where the network denies all activities except for those
on the list. - ANSWER-False
Integrity prevents unauthorized changes to data. - ANSWER-True
A WAN domain refers to the authorized and authenticated remote access
procedures for users to remotely access the organization's IT infrastructure,
systems, and data. - ANSWER-False
The term monitoring refers to the act of creating or recording events into a log. -
ANSWER-False
The term zero day exploit describes a new and previously unknown attack for which
there is not a current specific defense. - ANSWER-True
Which of the following refers to a form of attack that attempts to compromise
availability? - ANSWER-Denial of service (DoS)