1.
Security on a network not
only means being able to prevent a hacker from breaking into your computer but
also includes being able to recover from temporary service problems or from
natural disasters.
2.
Business continuity
planning refers primarily to ensuring availability, with some aspects of data
integrity.
3.
A threat to the data
communications network is any potential adverse occurrence that can do harm,
interrupt the systems using the network, or cause a monetary loss to the
organization.
4.
Fault-intolerant servers
contain many redundant components to prevent failure.
5.
Often, incidents of ___________ involve employees of the
organization, surprisingly enough.
A. 
B. 
C. 
D. 
E. 
6.
________ controls discover unwanted events.
A. 
B. 
C. 
D. 
E. 
7.
A(n) ____________, is an information system that is critical
to the survival of an organization.
A. 
B. 
C. 
D. 
Mission critical application
E. 
8.
A(n) __________ is any potential adverse occurrence that can
do harm, interrupt the system using the network to cause monetary loss to the
organization.
A. 
B. 
C. 
D. 
E. 
9.
What are the two main types of security problems?
10.
An intruder uses TCP
spoofing to send packets to a target computer requesting certain privileges be
granted to some user.
11.
A patch is a software
solution to correct a security hole
12.
A brute-force attack is a
method of trying to guess the correct password by trying every possible key.
13.
Social engineering refers
to creating a team that solves virus problems.
14.
A commodity product or
service is one that is widely available and thus offers low profit margins to
its providers
15.
Disruptive Innovations (as
defined by Christensen) involve radically new technologies
16.
The traditional network
design approach (used before the building block approach) worked very well for
rapidly changing networks.
17.
Today, the most expensive
part of the network is the hardware.
18.
Networks requirements can
be divided into mandatory, desirable, and wish-list requirements.
19.
The turnpike effect results
when a network is used at a much lower rate than was anticipated when it was
designed.
20.
A sniffer program is a:
A. 
B. 
Small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location
C. 
Used in a call-back modem
D. 
A program that records all LAN messages received for later (unauthorized) analysis
E. 
21.
__________ refers to the
process of translating between one set of private addresses inside a network
and a set of public address outside the network.
A. 
B. 
C. 
Network address translation
D. 
E. 
22.
IP spoofing means to
A. 
Fool the target computer and any intervening firewall into believing that messages from the intruder’s computer are actually coming from an authorized user inside the organization’s network
B. 
Clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation
C. 
Illegally tape or listen in on telephone conversations
D. 
Detect and prevent denial-of-service attacks
E. 
Act as an intermediate host computer between the Internet and the rest of the organization’s networks
23.
A(n) _________ is a type of application level firewall that is
transparent so that no other computer notices that it is on the network.
A. 
B. 
C. 
D. 
E. 
24.
A way to prevent intrusion by disguising information through
algorithms is:
A. 
B. 
C. 
D. 
E. 
25.
The use of
computer analysis techniques to gather evidence for criminal and/or civil
trials is known as:
A. 
B. 
C. 
D. 
E.