Filters
Question type

Study Flashcards

A Trojan horse allows a user to access a computer from a remote location.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?


A) locks on network circuits after working hours
B) passwords that disable the screen and keyboard of a computer
C) secured network cabling behind walls and above ceilings
D) use of armored cable
E) unlocked wiring closet for network devices

F) None of the above
G) B) and D)

Correct Answer

verifed

verified

List three risk assessment frameworks that are commonly used.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Risk assessment frameworks are structure...

View Answer

Fault-intolerant servers contain many redundant components to prevent failure.

A) True
B) False

Correct Answer

verifed

verified

A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.

A) True
B) False

Correct Answer

verifed

verified

Microsoft's Windows operating system meets A1 level security.

A) True
B) False

Correct Answer

verifed

verified

Describe the four risk control strategies and when you might use each one.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The four risk control strategies are avo...

View Answer

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.


A) WLANs
B) intranet
C) extranet
D) WAN
E) none of the above

F) A) and B)
G) C) and D)

Correct Answer

verifed

verified

What is IP spoofing?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

IP spoofing is a technique used to falsi...

View Answer

A n) ______ is a special type of virus that spreads itself without human intervention.


A) snake
B) worm
C) Trojan horse
D) boot sector virus
E) stealth virus

F) A) and E)
G) C) and E)

Correct Answer

verifed

verified

The use of hacking techniques to bring attention to a larger political or social goal is referred to as


A) hacking
B) ethical politics
C) hacktivism
D) social engineering
E) brute force attacks

F) All of the above
G) A) and B)

Correct Answer

verifed

verified

An uninterruptible power supply utilizes a second redundant disk for every disk on the server.

A) True
B) False

Correct Answer

verifed

verified

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.


A) risk assessment
B) backplane
C) mitigating control factor analysis
D) control verification worksheet
E) control test plan

F) B) and C)
G) C) and D)

Correct Answer

verifed

verified

How does a network manager utilize a user profile?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

A network manager utilizes a user profil...

View Answer

Which of the following is a mode that is used by IPSec?


A) exchange
B) sniffer
C) tunnel
D) creeper
E) firefighter

F) B) and E)
G) C) and D)

Correct Answer

verifed

verified

The key principle in preventing disruption, destruction and disaster is ___________.


A) redundancy
B) control spreadsheet
C) IDS
D) anti-virus software
E) prevention controls

F) None of the above
G) A) and E)

Correct Answer

verifed

verified

Social engineering refers to creating a team that solves virus problems.

A) True
B) False

Correct Answer

verifed

verified

________ controls fix a trespass into the network.


A) corrective
B) detective
C) preventive
D) mitigating
E) backup

F) C) and E)
G) C) and D)

Correct Answer

verifed

verified

A network switch failure is an example of an) ________ threat.


A) internal
B) disruptive
C) causal
D) intrusion
E) disaster

F) A) and C)
G) A) and E)

Correct Answer

verifed

verified

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 127

Related Exams

Show Answer