1.
A(n) ____ is “a private data network that makes use of the public
telecommunication infrastructure, maintaining privacy through the use
of a tunneling protocol and security procedures.”
A. 
B. 
C. 
D. 
2.
In SESAME, the user is first authenticated to an authentication server
and receives a token. The token is then presented to a privilege
attribute server as proof of identity to gain a(n) ____.
A. 
B. 
C. 
D. 
3.
____ generates and issues session keys in Kerberos.
A. 
B. 
C. 
D. 
4.
____ firewalls examine every incoming packet header and can selectively
filter packets based on header information such as destination address,
source address, packet type, and other key information.
A. 
B. 
C. 
D. 
5.
ICMP uses port ____ to request a response to a query and can be the first indicator of a malicious attack.
A. 
B. 
C. 
D. 
6.
Telnet protocol packets usually go to TCP port ____.
A. 
B. 
C. 
D. 
7.
The dominant architecture used to secure network access today in large organizations is the ____ firewall.
A. 
B. 
C. 
D. 
8.
____ filtering allows the firewall to react to an emergent event and update or create rules to deal with the event.
A. 
B. 
C. 
D. 
9.
____ firewalls keep track of each network connection between internal and external systems.
A. 
B. 
C. 
D. 
10.
The proxy server is often placed in an unsecured area of the network or is placed in the ____ zone.
A. 
B. 
C. 
D. 
11.
A(n) ____ works like a burglar alarm in that it detects a violation of
its configuration (analogous to an opened or broken window) and
activates an alarm.
A. 
B. 
C. 
D. 
12.
Using ____, the system reviews the log files generated by servers, network devices, and even other IDPSs.
A. 
B. 
C. 
D. 
13.
____ are decoy systems designed to lure potential attackers away from critical systems and encourage attacks against themselves.
A. 
B. 
C. 
D. 
14.
____ is the action of luring an individual into committing a crime to get a conviction.
A. 
B. 
C. 
D. 
15.
A(n) ____ is a network tool that collects copies of packets from the network and analyzes them.
A. 
B. 
C. 
D. 
16.
Which of the following is the most secure Biometric Authentication system?
A. 
B. 
Retina pattern recognition
C. 
D. 
17.
A(n) ____ IDPS is focused on protecting network information assets.
A. 
B. 
C. 
D. 
18.
____ is a specially configured connection on a network device that is
capable of viewing all of the traffic that moves through the entire
device
A. 
B. 
C. 
D. 
19.
NIDPSs must look for attack patterns by comparing measured activity to known ____ in their knowledge base.
A. 
B. 
C. 
D. 
20.
____ benchmark and monitor the status of key system files and detect
when an intruder creates, modifies, or deletes monitored files.
A. 
B. 
C. 
D. 
21.
____ sensors project and detect an infrared beam across an area.
A. 
B. 
C. 
D. 
22.
Class ____ fires are extinguished by agents that remove oxygen from the fire.
A. 
B. 
C. 
D. 
23.
Class ____ fires are extinguished with agents that must be non-conducting.
A. 
B. 
C. 
D. 
24.
____ sprinklers are the newest form of
sprinkler systems and rely on ultra fine mists instead of traditional
shower-type systems.
A. 
B. 
C. 
D. 
25.
One of the leading causes of damage to sensitive circuitry is ____.
A. 
B. 
C. 
D.