CIT 184 - Chapter One Quiz With Correct
Answers
T/F: |Reviewing |log |files |is |a |time-consuming |task |and |therefore |should |only |be |done |when |an |
attack |on |the |network |has |occurred. |- |CORRECT |ANSWER✔✔-False
Which |term |is |best |described |as |an |attack |that |relies |on |the |gullibility |of |people? |- |CORRECT |
ANSWER✔✔-Social |Engineering
What |is |VPN |typically |used |for? |- |CORRECT |ANSWER✔✔-Secure |Remote |Access
Which |of |the |following |is |a |type |of |script |that |automates |repetitive |tasks |in |an |application |
such |as |a |word |processor |but |can |also |be |programmed |to |be |a |virus? |- |CORRECT |
ANSWER✔✔-Macro
Why |might |you |want |your |security |system |to |provide |nonrepudiation? |- |CORRECT |
ANSWER✔✔-So |a |user |can't |deny |sending |or |receiving |a |communication.
Which |type |of |firewall |policy |calls |for |a |firewall |to |deny |all |traffic |by |default? |- |CORRECT |
ANSWER✔✔-Restrictive |Policy
Defense |in |depth |can |best |be |described |as |which |of |the |following? |- |CORRECT |ANSWER✔✔-A |
layered |approach |to |security.
What |tool |do |you |use |to |secure |remote |access |by |users |who |utilize |the |Internet? |- |CORRECT |
ANSWER✔✔-VPN
Malware |that |creates |networks |of |infected |computers |that |can |be |controlled |from |a |central |
station |is |referred |to |as |which |of |the |following? |- |CORRECT |ANSWER✔✔-Botnet
Answers
T/F: |Reviewing |log |files |is |a |time-consuming |task |and |therefore |should |only |be |done |when |an |
attack |on |the |network |has |occurred. |- |CORRECT |ANSWER✔✔-False
Which |term |is |best |described |as |an |attack |that |relies |on |the |gullibility |of |people? |- |CORRECT |
ANSWER✔✔-Social |Engineering
What |is |VPN |typically |used |for? |- |CORRECT |ANSWER✔✔-Secure |Remote |Access
Which |of |the |following |is |a |type |of |script |that |automates |repetitive |tasks |in |an |application |
such |as |a |word |processor |but |can |also |be |programmed |to |be |a |virus? |- |CORRECT |
ANSWER✔✔-Macro
Why |might |you |want |your |security |system |to |provide |nonrepudiation? |- |CORRECT |
ANSWER✔✔-So |a |user |can't |deny |sending |or |receiving |a |communication.
Which |type |of |firewall |policy |calls |for |a |firewall |to |deny |all |traffic |by |default? |- |CORRECT |
ANSWER✔✔-Restrictive |Policy
Defense |in |depth |can |best |be |described |as |which |of |the |following? |- |CORRECT |ANSWER✔✔-A |
layered |approach |to |security.
What |tool |do |you |use |to |secure |remote |access |by |users |who |utilize |the |Internet? |- |CORRECT |
ANSWER✔✔-VPN
Malware |that |creates |networks |of |infected |computers |that |can |be |controlled |from |a |central |
station |is |referred |to |as |which |of |the |following? |- |CORRECT |ANSWER✔✔-Botnet