ITN 101 EXAM 3 QUESTIONS WITH COMPLETE SOLUTIONS
1) How do VPNS accomplish the "private" part of a virtual private network? -- Answer
✔✔ Tunneling
2) Which of the following terms refers to attacking a Web server by forcing it to
respond to a flood of ping packets so that the server can't respond to normal traffic?
-- Answer ✔✔ DoS
3) Which of the following is a guideline for creating a security policy? -- Answer ✔✔ A
security policy should be enforceable.
4) Which of the following is a component of a security policy? (Choose all that apply --
Answer ✔✔ Authentication policy Privacy policy
5) Which of the following questions must he answered before determining what level
of security network requires? (Choose all that apply.) -- Answer ✔✔ What's being
protected? From whom should data be protected?
6) Which of the following should be a common element in any level of security policy?
(Choose all that apply.) -- Answer ✔✔ Backup procedures Data encryption
, 7) Which phrase from the following list best completes this sentence? If there's access
to the equipment, there's no -- Answer ✔✔ physical security
8) Which of the following is a requirement for rooms housing network servers? --
Answer ✔✔ Adequate cooling ceilings
9) Which procedure specifies what resources users can access and the tasks they can
perform on a network? -- Answer ✔✔ Authorization
10) If you wat to allow a blank password on a window computer, which of the following
do you set the password minimum length to? -- Answer ✔✔ 0
11) If you want to prevent password guessing to foil intruders, you should enable which
of the following? -- Answer ✔✔ Account lockout
12) Which authentication protocol is used in a Windows domain environment? --
Answer ✔✔ Kerberos
13) Which of the following is a credential category? (Choose all that apply.) -- Answer
✔✔ Knowledge Inherence Possession
14) Which of the following is a method IPsec uses to authenticate the identity of
commuuicating devices? (Choose all that apply.) -- Answer ✔✔ Keeberos, digital
certificates
1) How do VPNS accomplish the "private" part of a virtual private network? -- Answer
✔✔ Tunneling
2) Which of the following terms refers to attacking a Web server by forcing it to
respond to a flood of ping packets so that the server can't respond to normal traffic?
-- Answer ✔✔ DoS
3) Which of the following is a guideline for creating a security policy? -- Answer ✔✔ A
security policy should be enforceable.
4) Which of the following is a component of a security policy? (Choose all that apply --
Answer ✔✔ Authentication policy Privacy policy
5) Which of the following questions must he answered before determining what level
of security network requires? (Choose all that apply.) -- Answer ✔✔ What's being
protected? From whom should data be protected?
6) Which of the following should be a common element in any level of security policy?
(Choose all that apply.) -- Answer ✔✔ Backup procedures Data encryption
, 7) Which phrase from the following list best completes this sentence? If there's access
to the equipment, there's no -- Answer ✔✔ physical security
8) Which of the following is a requirement for rooms housing network servers? --
Answer ✔✔ Adequate cooling ceilings
9) Which procedure specifies what resources users can access and the tasks they can
perform on a network? -- Answer ✔✔ Authorization
10) If you wat to allow a blank password on a window computer, which of the following
do you set the password minimum length to? -- Answer ✔✔ 0
11) If you want to prevent password guessing to foil intruders, you should enable which
of the following? -- Answer ✔✔ Account lockout
12) Which authentication protocol is used in a Windows domain environment? --
Answer ✔✔ Kerberos
13) Which of the following is a credential category? (Choose all that apply.) -- Answer
✔✔ Knowledge Inherence Possession
14) Which of the following is a method IPsec uses to authenticate the identity of
commuuicating devices? (Choose all that apply.) -- Answer ✔✔ Keeberos, digital
certificates