WITH COMPLETE SOLUTIONS
Which term describes when a system is usable for its intended purpose?
Availability
Encryption
Authorization
Auditing - ANSWER-Availability
Which of the following describes authentication?
A stated purpose or target for network security activity
Confidence in the expectation that others will act in your best interest or that a
resource is authentic
The process of confirming the identity of a user
A small network, workgroup, or client/server, deployed by a small business, a home-
based business, or just a family network in a home - ANSWER-The process of
confirming the identity of a user
A blacklist is a type of filtering where the network denies all activities except for those
on the list.
True or False? - ANSWER-False
The term thin client computing refers to a legacy terminal concept used to control
mainframes.
True or False? - ANSWER-True
Which term is used to describe the process of encasing one protocol or packet inside
another protocol or packet?
Intrusion Detection System (IDS)
Encryption
Chokepoint
Encapsulation - ANSWER-Encapsulation
Authorization protects the confidentiality, integrity, and availability of personally
identifiable or sensitive data.
True or False? - ANSWER-False
Intrusion Detection System (IDS) is a security mechanism that detects unauthorized
user activities, attacks, and network compromises.
,True or False? - ANSWER-True
Encryption is the process or mechanism that grants or denies use of a resource.
True or False? - ANSWER-False
Which term is used to describe a network security device or host software that filters
communications, usually network traffic, based on a set of predefined rules?
Auditor
Sniffer
Hacker
Firewall - ANSWER-Firewall
Which term describes a network device that forwards traffic between networks based
on the MAC address of the Ethernet frame?
Bottleneck
Bridge
Domain
Node - ANSWER-Bridge
Tunneling is the act of transmitting a protocol across an intermediary network by
encapsulating it in another protocol.
True or False? - ANSWER-True
Which of the following describes caching?
Retention of Internet content by a proxy server
A network service that acts as a “middle man” between a client and
server
Filtering traffic as it attempts to enter a network
A mechanism to establish a secure remote access connection across an
intermediary network - ANSWER-Retention of Internet content by a proxy server
When conducting an audit, the auditor should be which of the following?
An external person who is independent of the organization under audit
An internal employee capable of enclosing or encasing one protocol or packet inside
another protocol or packet
An internal employee who can be trusted
, An external person capable of hacking - ANSWER-An external person who is
independent of the organization under audit
Which of the following refers to a form of attack that attempts to compromise
availability?
Zero day exploits
Man-in-the-middle (mitm)
Denial of service (DoS)
Sniffer - ANSWER-Denial of service (DoS)
Caching is the retention of Internet content by a proxy server.
True or False? - ANSWER-True
A WAN domain refers to the authorized and authenticated remote access
procedures for users to remotely access the organization's IT infrastructure,
systems, and data.
True or False? - ANSWER-False
Which of the following is the name given to unauthorized access to a system?
Backdoor
Tunneling
Highjacking
Exploit - ANSWER-Backdoor
Which of the following characteristics relates to a demilitarized zone (DMZ)?
Confidence in the expectation that others will act in your best interest or that a
resource is authentic
A type of perimeter network used to host resources designated as accessible by the
public from the Internet
A form of networking where each computer is a peer
A host on a network - ANSWER-A type of perimeter network used to host resources
designated as accessible by the public from the Internet
Integrity prevents unauthorized changes to data.
True or False? - ANSWER-True
Which of the following terms refers to the process of securing or locking down a host
against threats and attacks?
Authorization
Redundancy
Hardening