IT6310 - Network Security
|
Network security is the practice of
preventing and protecting against unauthorized intrusion into corporate
networks. |
True |
|
Stephen Northcutt
wrote an essay on the basics of network security for CS) online last year. |
False |
|
Network security is
the process of taking physical and software preventative measures to protect
the underlying networking infrastructure from unauthorized access |
True |
|
Preventive security
is implemented by the tasks and tools you use to prevent unauthorized people
or programs from accessing your networks and the devices connected to them. |
False |
|
As a philosophy, it
complements midpoint security, which focuses on individual devices;
preventive security instead focuses on how those devices interact, and on the
connective tissue between them. |
False |
|
If there's one
common theme among security experts, it's that relying on one single line of
defense is dangerous, because any single defensive tool can be defeated by a
determined adversary. |
defense in depth strategy |
|
This is an enhanced
encryption protocol combining a 104-bit key and a 24-bit initializing vector. |
WEP 128 |
|
It uses available
resources, such as passwords or scripts. |
unstructured attacks |
|
It helps prevent
attackers from monitoring or recording traffic between resources and
computers. |
data encryption |
|
These are created
with malicious intent and sent by attackers. |
virus |
|
A tool (typically
based on IPsec or SSL) that authenticates the communication between a device
and a secure network, creating a secure, encrypted "tunnel" across
the open internet |
VPN |
|
This refers to the
events or attacks that steal, damage, or destroy equipment. |
physical security threats |
|
This is data being
transported on a network. |
traffic |
|
One example is when
an employee intends to cause damage. |
malicious threats |
|
Software designed
to detect, disable, and remove viruses, worms, and Trojans. |
antivirus |
|
This is a way of
protecting a computer from intrusion through the ports. |
firewall |
|
It is a
self-replicating program that is harmful to networks. |
worm |
|
It disguises as
useful software. |
trojan horse |
|
A security layer
used in mobile devices that employ the Wireless Applications Protocol (WAP). |
WTLS |
|
It is a wireless
security protocol created by Cisco to address the weaknesses in WEP and WPA. |
LEAP |
|
It could be
exploited because of an encryption key that was vulnerable to decoding. |
WEP 64 |
|
These are the events
or attacks that remove, corrupt, deny access to, allow access to, or steal
information. |
data security attacks |
|
It was the first
generation security standard for wireless network. |
WEP |
|
Human beings are
inevitably the weakest security link. You need to implement technologies and
processes to ensure that staffers don't deliberately or inadvertently send
sensitive data outside the network. |
Data Loss Prevention |
|
If the network
isn't a line or a point: it's a _____________. |
territory |
|
This is when the user
damages data or equipment unintentionally. |
accidental threats |
|
It helps keep data
and equipment safe by giving only the appropriate people access. |
network security |
|
It uses code to
access operating systems and software. |
structured attacks |
|
This is an improved
version of WEP. |
WPA |
|
This is a
networking infrastructure company. |
CISCO |
kulang
ReplyDelete