The 'Network Data Communications Finals' quiz assesses understanding of network security, including threat management, business continuity, and fault tolerance. It tests recovery strategies and the role of employees in security breaches, crucial for professionals in IT security.
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Intrusion
Disruption
Controlled chaos
Destruction
Distaster
Rate this question:
Preventative
Corrective
Detective
Mitigating
Backup
Rate this question:
Network plan
Accounting system
IDS
Mission critical application
Firewall
Rate this question:
Asset
Service level agreement
Threat
Security plan
Network design
Rate this question:
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Type of macro-virus
Small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location
Used in a call-back modem
A program that records all LAN messages received for later (unauthorized) analysis
Secure hub program
Rate this question:
Translation
Conversion
Network address translation
Proxy translation
IP conversion
Rate this question:
Fool the target computer and any intervening firewall into believing that messages from the intruder’s computer are actually coming from an authorized user inside the organization’s network
Clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation
Illegally tape or listen in on telephone conversations
Detect and prevent denial-of-service attacks
Act as an intermediate host computer between the Internet and the rest of the organization’s networks
Rate this question:
ANI System
NAT Proxy Server
IP Spoofing Bridge
Packet level firewall
Smart hub
Rate this question:
Spoofing
Call-back access
Encryption
Disk elevatoring
Disk mirroring
Rate this question:
Trojan horse
Sniffing
Tunneling
Computer forensics
Misuse detection
Rate this question:
They are offered over a web interface
They are accessible over a network
Resources can be rapidly scaled in and out
One can keep precise records of resources consumption
Resources are used by multiple users at the same time
Rate this question:
Technology design
Needs analysis
Narrow and deep analysis
Cost assessment
Distribution layering
Rate this question:
True
False
Rate this question:
Applications of the proposed network
Servers in the proposed network
Circuits in the proposed network
Specific routers that have been chosen to implement the proposed network
Clients in the proposed network
Rate this question:
Software
Hardware
Purchasing and installing circuits
Users' furniture
Circuits provided by common carriers
Rate this question:
Rate this question:
Quiz Review Timeline (Updated): Apr 19, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.