Deck 1: Introduction to Network Security

ملء الشاشة (f)
exit full mode
سؤال
Which approach to security is proactive in addressing potential threats before they occur?

A)Passive security approach
B)Layered security approach
C)Dynamic security approach
D)Hybrid security approach
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is a technique used to determine if someone is trying to falsely deny that they performed a particular action?

A)Auditing
B)Sneaking
C)Non-repudiation
D)Access Control Authorization
سؤال
An attack characterized by an explicit attempt by attackers to prevent legitimate users from accessing a system is called:

A)denial of service.
B)social engineering.
C)spoofing.
D)war-dialing.
سؤال
Encryption and virtual private networks are techniques used to secure which of the following?

A)Data
B)Firewalls
C)Proxy servers
D)Connection points
سؤال
Which of the following is NOT a connectivity device used to connect machines on a network?

A)Hub
B)Switch
C)Proxy server
D)Network interface card
سؤال
Which is a technique used to provide false information about data packets?

A)Hacking
B)Spoofing
C)Phreaking
D)Social engineering
سؤال
A text file that is downloaded to a computer by a Web site to provide information about the Web site and online access is called a:

A)cookie
B)key logger
C)script kiddy
D)Trojan horse.
سؤال
The process of reviewing logs,records,and procedures to determine whether they meet appropriate standards is called:

A)auditing
B)filtering
C)sneaking
D)authenticating
سؤال
Which term is generally used by hackers to refer to attempts at intrusion into a system without permission and usually for malevolent purposes?

A)Hacking
B)Cracking
C)Blocking
D)Social engineering.
سؤال
The process of determining whether the credentials given by a user are authorized to access a particular network resource is called:

A)auditing
B)accessing
C)authorization
D)authentication
سؤال
Which of the following maintains a repository for information on virus outbreaks and detailed information about specific viruses?

A)CERT
B)F-Secure Corporation
C)Microsoft Security Advisor
D)SANS Institute
سؤال
A category of software that keeps track of users' activities on a computer is called ____________.
سؤال
____________ is a type of attack where header information on data packets is changed to provide false information.
سؤال
Which approach to security addresses both the system perimeter and individual systems within the network?

A)Perimeter security approach
B)Layered security approach
C)Dynamic security approach
D)Hybrid security approach
سؤال
In addition to mandating federal agencies to establish security measures,the Computer Security Act of 1987 defined important terms such as:

A)sensitive information
B)unauthorized access
C)private information
D)security information
سؤال
A(n)____________ serves as a barrier to unauthorized communication between a network and the outside world.
سؤال
Those who exploit systems for harm such as to erase files,change data,or deface Web sites are typically called:

A)white hat hackers
B)gray hat hackers
C)red hat hackers
D)black hat hackers
سؤال
A term used to describe calling numerous telephone numbers,usually sequentially,in hopes of reaching a computer to attempt to hack into is called ____________.
سؤال
Another name for an ethical hacker operating legally and with permission is ____________.
سؤال
Which is NOT one of the three broad classes of security threats?

A)Malicious software
B)Disclosing contents of private networks
C)Gaining unauthorized access into a system
D)Preventing or blocking access to a system
سؤال
____________ refers to a process used to locate wireless networks that might be vulnerable to attack.
سؤال
The first computer incident-response team was sponsored by ____________ University.
سؤال
Flooding a system with many false connection attempts in an effort to prevent legitimate use is an example of a ____________ attack.
سؤال
The preferred paradigm,or approach to security,is a ____________ approach.
سؤال
Since they are easier to perpetrate than intrusions,____________ attacks are the most common form of attack after viruses.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to Network Security
1
Which approach to security is proactive in addressing potential threats before they occur?

A)Passive security approach
B)Layered security approach
C)Dynamic security approach
D)Hybrid security approach
C
2
What is a technique used to determine if someone is trying to falsely deny that they performed a particular action?

A)Auditing
B)Sneaking
C)Non-repudiation
D)Access Control Authorization
C
3
An attack characterized by an explicit attempt by attackers to prevent legitimate users from accessing a system is called:

A)denial of service.
B)social engineering.
C)spoofing.
D)war-dialing.
A
4
Encryption and virtual private networks are techniques used to secure which of the following?

A)Data
B)Firewalls
C)Proxy servers
D)Connection points
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT a connectivity device used to connect machines on a network?

A)Hub
B)Switch
C)Proxy server
D)Network interface card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which is a technique used to provide false information about data packets?

A)Hacking
B)Spoofing
C)Phreaking
D)Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
A text file that is downloaded to a computer by a Web site to provide information about the Web site and online access is called a:

A)cookie
B)key logger
C)script kiddy
D)Trojan horse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
The process of reviewing logs,records,and procedures to determine whether they meet appropriate standards is called:

A)auditing
B)filtering
C)sneaking
D)authenticating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which term is generally used by hackers to refer to attempts at intrusion into a system without permission and usually for malevolent purposes?

A)Hacking
B)Cracking
C)Blocking
D)Social engineering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
The process of determining whether the credentials given by a user are authorized to access a particular network resource is called:

A)auditing
B)accessing
C)authorization
D)authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following maintains a repository for information on virus outbreaks and detailed information about specific viruses?

A)CERT
B)F-Secure Corporation
C)Microsoft Security Advisor
D)SANS Institute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
A category of software that keeps track of users' activities on a computer is called ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
____________ is a type of attack where header information on data packets is changed to provide false information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which approach to security addresses both the system perimeter and individual systems within the network?

A)Perimeter security approach
B)Layered security approach
C)Dynamic security approach
D)Hybrid security approach
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
In addition to mandating federal agencies to establish security measures,the Computer Security Act of 1987 defined important terms such as:

A)sensitive information
B)unauthorized access
C)private information
D)security information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
A(n)____________ serves as a barrier to unauthorized communication between a network and the outside world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
Those who exploit systems for harm such as to erase files,change data,or deface Web sites are typically called:

A)white hat hackers
B)gray hat hackers
C)red hat hackers
D)black hat hackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
A term used to describe calling numerous telephone numbers,usually sequentially,in hopes of reaching a computer to attempt to hack into is called ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Another name for an ethical hacker operating legally and with permission is ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which is NOT one of the three broad classes of security threats?

A)Malicious software
B)Disclosing contents of private networks
C)Gaining unauthorized access into a system
D)Preventing or blocking access to a system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
____________ refers to a process used to locate wireless networks that might be vulnerable to attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
The first computer incident-response team was sponsored by ____________ University.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
Flooding a system with many false connection attempts in an effort to prevent legitimate use is an example of a ____________ attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
The preferred paradigm,or approach to security,is a ____________ approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
Since they are easier to perpetrate than intrusions,____________ attacks are the most common form of attack after viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.