Your browser does not support JavaScript!

Network Security

30 answers

A security layer used in mobile devices that employ the Wireless Applications Protocol (WAP).
  • WTLS Correct
A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure network, creating a secure, encrypted "tunnel" across the open internet
  • VPN Correct
As a philosophy, it complements midpoint security, which focuses on individual devices; preventive security instead focuses on how those devices interact, and on the connective tissue between them.
  • False Correct
Human beings are inevitably the weakest security link. You need to implement technologies and processes to ensure that staffers don't deliberately or inadvertently send sensitive data outside the network.
  • Data Loss Prevention Correct
If the network isn't a line or a point: it's a _____________.
  • territory Correct
If there's one common theme among security experts, it's that relying on one single line of defense is dangerous, because any single defensive tool can be defeated by a determined adversary.
  • defense in depth strategy Correct
It could be exploited because of an encryption key that was vulnerable to decoding.
  • WEP 64 Correct
It disguises as useful software.
  • trojan horse Correct
It helps keep data and equipment safe by giving only the appropriate people access.
  • network security Correct
It helps prevent attackers from monitoring or recording traffic between resources and computers.
  • data encryption Correct
It is a self-replicating program that is harmful to networks.
  • worm Correct
It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA.
  • LEAP Correct
It uses available resources, such as passwords or scripts.
  • unstructured attacks Correct
It uses code to access operating systems and software.
  • structured attacks Correct
It was the first generation security standard for wireless network.
  • WEP Correct
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks.
  • True Correct
Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access
  • True Correct
One example is when an employee intends to cause damage.
  • malicious threats Correct
Preventive security is implemented by the tasks and tools you use to prevent unauthorized people or programs from accessing your networks and the devices connected to them.
  • False Correct
Software designed to detect, disable, and remove viruses, worms, and Trojans.
  • antivirus Correct
Stephen Northcutt wrote an essay on the basics of network security for CS) online last year.
  • False Correct
These are created with malicious intent and sent by attackers.
  • virus Correct
These are the events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
  • data security attacks Correct
This is a networking infrastructure company.
  • CISCO Correct
This is a way of protecting a computer from intrusion through the ports.
  • firewall Correct
This is an enhanced encryption protocol combining a 104-bit key and a 24-bit initializing vector.
  • WEP 128 Correct
This is an improved version of WEP.
  • WPA Correct
This is data being transported on a network.
  • traffic Correct
This is when the user damages data or equipment unintentionally.
  • accidental threats Correct
This refers to the events or attacks that steal, damage, or destroy equipment.
  • physical security threats Correct
All courses