Dfn5033 Network Security Test Dis 2017

30 Questions | Total Attempts: 70

SettingsSettingsSettings
Please wait...
Dfn5033 Network Security Test Dis 2017

.


Questions and Answers
  • 1. 
    Three characteristics of information must be protected by information security, EXCEPT
    • A. 

      Availability

    • B. 

      Confidentiality

    • C. 

      Stability

    • D. 

      Integrity

  • 2. 
    Which of the following is NOT considered as potential risk to network security?
    • A. 

      Criminal element

    • B. 

      Hackers

    • C. 

      Terrorist

    • D. 

      Human

  • 3. 
    Select which threats are the most serious.
    • A. 

      External threats

    • B. 

      Internal threats

    • C. 

      Unknown threats

    • D. 

      Unstructured threats

  • 4. 
    Select option is the term for a weakness in a system or its design that can be exploited by a threat
    • A. 

      Attack

    • B. 

      Exploit

    • C. 

      Risk

    • D. 

      Vulnerability

  • 5. 
    Identify the first step you should take when considering securing your network?
    • A. 

      Install a firewall

    • B. 

      Install an Intrusion Prevention System

    • C. 

      Update servers and user PCs with the latest patches

    • D. 

      Develop a security policy

  • 6. 
    In VPNs, the term “tunneling” refers to
    • A. 

      An optional feature that increases network performance when turned on

    • B. 

      The encapsulation of packets inside packets of different protocol to create and maintain the virtual circuit

    • C. 

      The method a system administrator uses to detect hackers on the network

    • D. 

      A marketing strategy to sell VPN products cheaply in return for expensive service contracts

  • 7. 
    A combination of hardware components and appropriate software that controls or filters access between two networks is called
    • A. 

      An antivirus/antivirus

    • B. 

      A firewall

    • C. 

      A port

    • D. 

      A trojan

  • 8. 
    A firewall needs to be ____ so that it can grow with the network it protects
    • A. 

      Robust

    • B. 

      Expensive

    • C. 

      Fast

    • D. 

      Scalable

  • 9. 
    Select the TRUE statement of intrusion prevention systems
    • A. 

      They operate in promiscuous mode

    • B. 

      They have no potential impact on the data segment being monitored

    • C. 

      They operate in inline mode

    • D. 

      They are more vulnerable to evasion techniques than IDS

  • 10. 
    Most difficult to implement, All security measures are implemented, Assumes that the protected assets are premium (top), all users are not trustworthy and threats are frequent. Relate which security model is being described by the above statement.
    • A. 

      Easy Security Model

    • B. 

      Open Security Model

    • C. 

      Close Security Model

    • D. 

      Restrictive Security Model

  • 11. 
    Which type of attack denies authorized users access to network resources?
    • A. 

      DoS

    • B. 

      Logic bomb

    • C. 

      Social engineering

    • D. 

      Worm

  • 12. 
    Which of the following attack techniques does not require deep technical knowledge?
    • A. 

      Password guessing

    • B. 

      Social engineering

    • C. 

      Man in the middle attack

    • D. 

      Sniffing

  • 13. 
    Select a protocol that can be protect traffic inside a VPN tunnel.
    • A. 

      Telnet

    • B. 

      SSL

    • C. 

      SSH

    • D. 

      SMTP

  • 14. 
    Find the best describes malware that takes advantage of a security hole, and then automatically replicates to other systems running the same software?
    • A. 

      Spyware

    • B. 

      Trojan

    • C. 

      Virus

    • D. 

      Worm

  • 15. 
    Find one of the following is not an attack, but a search for vulnerabilities to attack?
    • A. 

      Dumpster diving

    • B. 

      Port scanning

    • C. 

      Denial of service

    • D. 

      Man in the middle attack

  • 16. 
    _______________ refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of attack prior to launching an attack.
    • A. 

      Scanning

    • B. 

      Reconnaissance

    • C. 

      Sniffing

    • D. 

      Access

  • 17. 
    VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
    • A. 

      SSL, tunneling

    • B. 

      IPSec,SSL

    • C. 

      IPSec,tunneling

    • D. 

      IPSec,SSH

  • 18. 
    Select which of the following devices should be placed in the DMZ
    • A. 

      Web server

    • B. 

      Server Network switch

    • C. 

      Database server

    • D. 

      File/print server

  • 19. 
    A high profile company has been receiving a high volume of attacks on their website. The network administrator wants to be able to collect information on the attacker(s) so legal action can be taken. Select a device should be implemented? 
    • A. 

      DMZ

    • B. 

      Honey pot

    • C. 

      firewall

    • D. 

      New subnet

  • 20. 
    Why proxy server is used in network?
    • A. 

      To provide security against unauthorized users

    • B. 

      To process client requests for Web pages

    • C. 

      To process client requests for database access

    • D. 

      To provide TCP/IP

  • 21. 
    Which of the following security devices act more like a detective rather than a preventative measure?
    • A. 

      NAT

    • B. 

      Proxy

    • C. 

      IDS

    • D. 

      DMZ

  • 22. 
    The following is the component of a firewall EXCEPT :
    • A. 

      Packet Filter

    • B. 

      Dynamic Network Address Translation (DNAT)

    • C. 

      Network Address Translation (NAT)

    • D. 

      Proxy Server

  • 23. 
    ____________ defines the way in which messages are transmitted over the Internet.
    • A. 

      HTTP

    • B. 

      POP

    • C. 

      SMTP

    • D. 

      SNMP

  • 24. 
    ______ is defined as the protection of networks and their services from unauthorized modification, destruction, or disclosure.
    • A. 

      Network security

    • B. 

      Physical security

    • C. 

      Buffer Overflow

    • D. 

      Ethical Hacking

  • 25. 
    ___________ is a computer that is completely vulnerable to attacks.
    • A. 

      Bastion host

    • B. 

      Application Server

    • C. 

      Firewall Server

    • D. 

      Rogue Server

Back to Top Back to top