Related Topics
Take Another Quiz

Networking Test Cit370

20 Questions
Networking Quizzes & Trivia

This is a quiz to text your knowledge in security of networking. It is for the CIT370 course.

Questions and Answers
  • 1. 
     
    Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.
    • A. 

      DLP manager

    • B. 

      DLP control

    • C. 

      DLP agent

    • D. 

      DLP cipher

  • 2. 
    A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
    • A. 

      IPS

    • B. 

      Scanner

    • C. 

      Firewall

    • D. 

      Honeypot

  • 3. 
    Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
    • A. 

      True

    • B. 

      False

  • 4. 
    A ____ outlines the major security considerations for a system and becomes the starting point for solid security.
    • A. 

      Reference

    • B. 

      Baseline

    • C. 

      Profile

    • D. 

      Minimum

  • 5. 
    In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
    • A. 

      Heuristic detection

    • B. 

      Pattern detection

    • C. 

      Hybrid detection

    • D. 

      Combination detection

  • 6. 
    Keyed entry locks are much more difficult to defeat than deadbolt locks.
    • A. 

      True

    • B. 

      False

  • 7. 
    Securing a restricted area by erecting a barrier is called ____.
    • A. 

      Blocking

    • B. 

      Boundary placement

    • C. 

      Fencing

    • D. 

      Moating

  • 8. 
    Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners.
    • A. 

      True

    • B. 

      False

  • 9. 
    ____ can be prewired for electrical power as well as wired network connections.
    • A. 

      Locking cabinets

    • B. 

      Fences

    • C. 

      Locking drawers

    • D. 

      Desks

  • 10. 
    A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
    • A. 

      U-lock

    • B. 

      Safe lock

    • C. 

      Shield lock

    • D. 

      Cable lock

  • 11. 
    A ____ is software that is a cumulative package of all security updates plus additional features.
    • A. 

      Feature pack

    • B. 

      Roll-up

    • C. 

      Service pack

    • D. 

      Patch

  • 12. 
    ____ use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
    • A. 

      Lockout sensors

    • B. 

      Engineering sensors

    • C. 

      Tailgate sensors

    • D. 

      Proximity sensors

  • 13. 
    ID badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.
     
       
     
    • A. 

      Wave

    • B. 

      Pulse

    • C. 

      AFID

    • D. 

      RFID

  • 14. 
    A ____ is designed to separate a nonsecured area from a secured area.
    • A. 

      Lockout

    • B. 

      Mantrap

    • C. 

      Closet

    • D. 

      Pit

  • 15. 
    An anti-climb collar is a ____ that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing.
    • A. 

      Flat collar

    • B. 

      Spiked collar

    • C. 

      Slippery collar

    • D. 

      Sharp collar

  • 16. 
    A ____ is an independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
    • A. 

      Bollard

    • B. 

      Fence

    • C. 

      Roller barrier

    • D. 

      Top hat

  • 17. 
    ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
    • A. 

      Biometric locks

    • B. 

      Cipher locks

    • C. 

      Multifactor locks

    • D. 

      Reaction locks

  • 18. 
    When a policy violation is detected by the DLP agent, it is reported back to the DLP server.
    • A. 

      True

    • B. 

      False

  • 19. 
    ____ is defined as a security analysis of the transaction within its approved context.
    • A. 

      Content aggregation

    • B. 

      Content inspection

    • C. 

      Content delivery

    • D. 

      Content management

  • 20. 
    The signal from an ID badge is detected as the owner moves near a ____, which receives the signal.
    • A. 

      Proximity reader

    • B. 

      Mantrap

    • C. 

      Barcode scanner

    • D. 

      Magnetic scanner

Related Topics