IT6310 - Network Security
Network security is the practice of
preventing and protecting against unauthorized intrusion into corporate
networks. |
True |
Stephen Northcutt
wrote an essay on the basics of network security for CS) online last year. |
False |
Network security is
the process of taking physical and software preventative measures to protect
the underlying networking infrastructure from unauthorized access |
True |
Preventive security
is implemented by the tasks and tools you use to prevent unauthorized people
or programs from accessing your networks and the devices connected to them. |
False |
As a philosophy, it
complements midpoint security, which focuses on individual devices;
preventive security instead focuses on how those devices interact, and on the
connective tissue between them. |
False |
If there's one
common theme among security experts, it's that relying on one single line of
defense is dangerous, because any single defensive tool can be defeated by a
determined adversary. |
defense in depth strategy |
This is an enhanced
encryption protocol combining a 104-bit key and a 24-bit initializing vector. |
WEP 128 |
It uses available
resources, such as passwords or scripts. |
unstructured attacks |
It helps prevent
attackers from monitoring or recording traffic between resources and
computers. |
data encryption |
These are created
with malicious intent and sent by attackers. |
virus |
A tool (typically
based on IPsec or SSL) that authenticates the communication between a device
and a secure network, creating a secure, encrypted "tunnel" across
the open internet |
VPN |
This refers to the
events or attacks that steal, damage, or destroy equipment. |
physical security threats |
This is data being
transported on a network. |
traffic |
One example is when
an employee intends to cause damage. |
malicious threats |
Software designed
to detect, disable, and remove viruses, worms, and Trojans. |
antivirus |
This is a way of
protecting a computer from intrusion through the ports. |
firewall |
It is a
self-replicating program that is harmful to networks. |
worm |
It disguises as
useful software. |
trojan horse |
A security layer
used in mobile devices that employ the Wireless Applications Protocol (WAP). |
WTLS |
It is a wireless
security protocol created by Cisco to address the weaknesses in WEP and WPA. |
LEAP |
It could be
exploited because of an encryption key that was vulnerable to decoding. |
WEP 64 |
These are the events
or attacks that remove, corrupt, deny access to, allow access to, or steal
information. |
data security attacks |
It was the first
generation security standard for wireless network. |
WEP |
Human beings are
inevitably the weakest security link. You need to implement technologies and
processes to ensure that staffers don't deliberately or inadvertently send
sensitive data outside the network. |
Data Loss Prevention |
If the network
isn't a line or a point: it's a _____________. |
territory |
This is when the user
damages data or equipment unintentionally. |
accidental threats |
It helps keep data
and equipment safe by giving only the appropriate people access. |
network security |
It uses code to
access operating systems and software. |
structured attacks |
This is an improved
version of WEP. |
WPA |
This is a
networking infrastructure company. |
CISCO |
kulang
ReplyDelete