logo image

Security+ Chapter 10

_____________ is/are computers in a network that host applications and data for everyone to share.
– Linux boxes
– Servers
– Firewalls
– Cryptography
Servers
A(n) _________ is a network device that can be hardware, software, or a combination of both whose purpose is to enforce a security policy across its connections to external networks such as the Internet
– blister pack
– entity relationship diagram
– server
– firewall
firewall
Network access control is
– A Microsoft technology for controlling network access
– A security methodology involved in managing endpoints as they connect on a case-by-case basis
– The use of ACLs to permit network access
– MAC filtering on wireless device
A security methodology involved in managing endpoints as they connect on a case-by-case basis
A virtual private network (VPN) is a construct used to provide
– Users with their own web space on the network
– An area of relaxation for employees
– Secure communication channel between users across public networks such as the Internet
– A learning area for programming languages
Secure communication channel between users across public networks such as the Internet
________ are applications designed to detect, log, and respond to unauthorized A. network or host use, both in real time and after the fact
– Windows Operating System
– Intrusion detection systems (IDS)
– Firewalls
– Twisted wire pairs
Firewalls
Preventing physical access to a server by an unauthorized individual is the
– Responsibility of the CFO of an organization
– Primary security concern for a system administrator
– An organization’s least important concern
– Reason we implement firewalls
Primary security concern for a system administrator
Media can be divided into three categories:
– Paper, plastic, cloth
– Magnetic, optical, and electronic
– Confidential, integrity, authority
– Red, yellow, and blue
Magnetic, optical, and electronic
________ media store data through the rearrangement of magnetic particles on a nonmagnetic substrate
– Laser
– Optical
– Magnetic
– Static
Magnetic
________ are types of magnetic media.
– CDR, CDRW, DVD
– Linux, Windows, Oracle
– Hard drives, diskettes, tape
– Keyboards, mouse, monitor
Hard drives, diskettes, tape
_______ are characterized by the use of a laser to read data stored on a physical device.
– Authentication rules
– FTP sites
– Modems
– Optical media
Optical media
You are building a small network in the office. You will need to connect two different network segments that have different network addresses. What device will you use connect them?
– Hub
– Router
– Switch
– Server
Router
You are building a network and need to connect five computers in an office. They will be on the same network segment and you should be able to perform some security functions such as port address security. What device would you use to connect the computers?
– Switch
– Hub
– Router
– Server
Switch
You are building a network and need to connect three different network segments, including the Internet. The device must enforce security policies and perform stateful packet filtering. The device you would use is a
– Switch
– Bridge
– Router
– Firewall
Firewall
A hub operates at
– Layer 1, the physical layer
– Layer 2, the data link layer
– Layer 2, the MAC layer
– Layer 3, the network layer
Layer 1, the physical layer
The following are steps in securing a workstation EXCEPT:
– Install NetBIOS and IPX
– Install antivirus
– Remove unnecessary software
– Disable unnecessary user accounts
Install NetBIOS and IPX
Which operating system is immune to virus attacks?
– Windows 7
– Red Hat Linux
– Mac OS X
– No operating system is immune
No operating system is immune
Which device converts analog signals to digital signals and vice versa?
– Switch
– Hub
– Modem
– VPN
Modem
What protocol is used to manage IP address space?
– ICMP
– DHCP
– TCP
– SNMP
DHCP
Which of the following is an extension of the public telephone network into a business?
– PBX
– COTS
– SNMP
– SMTP
PBX
Centralized monitoring of the health of the network is the function of a
– File server
– SNMP
– NOC
– TOC
NOC
The intentions of computer virus writers have changed over the years, from wanting to simply spread a virus and be noticed, to the work of today’s stealthy botnet-creating criminals.
True or False
True
Worms are software that attaches itself to a file and then executes on a machine.
True or False
False
Hubs are the most common device used for connecting computers on a local area network.
True or False
False
A bridge works on layer 3 of the OSI model.
True or False
False
Switches create one big collision domain for all connected devices.
True or False
False
Category 5 cable is rated for 10-Mbps Ethernet.
True or False
False
It is difficult to make precise connections with fiber optic cables, but they are inexpensive.
True or False
False
Infrared works like wireless in that it can penetrate walls.
True or False
False
SMTP is a protocol for managing functions between devices.
True or False
False
The most common implementation of VPN is via IPsec
True or False
True

Need essay sample on "Security+ Chapter 10"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy