Unformatted text preview:

Name: __________________________ Date: _____________1. Which of the following is not one of the major categories (or sub-categories) into whichnetwork security threats can be placed?A) disruptionB) destructionC) controlled chaosD) intrusionE) disaster2. In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:A) decreased because the new sophisticated technology is far more secure than the old manual methodsB) remained the same because management was always deeply interest in control and securityC) decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler societyD) increased because this commitment to data communications has changed the potential vulnerability of the organization's assetsE) remained the same because there are very few threats to data communications3. An example of _____ of data would be if a computer virus eliminated files on that computer.A) disruptionB) controlled chaosC) intrusionD) destructionE) disaster4. A tornado that eliminates a network control center would be an example of a natural __________A) disasterPage 1B) disruptionC) controlled chaosD) destructionE) intrusion5. Often, incidents of ___________ involve employees of the organization, surprisingly enough.A) intrusionB) disruptionC) controlled chaosD) destructionE) disaster6. A network switch failure is an example of a(n) ________ threat.A) internalB) disruptiveC) causalD) intrusionE) disaster7. A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.A) interventionalB) controlled chaosC) disruptiveD) intrusionE) disasterPage 28. Developing _______ helps develop a secure network.A) rulesB) controlsC) network mapsD) vendor documentationE) service level agreements9. _________ controls stop a person from acting.A) detectiveB) correctiveC) mitigatingD) preventiveE) backup10. ________ controls discover unwanted events.A) preventiveB) correctiveC) detectiveD) mitigatingE) backup11. ________ controls fix a trespass into the network.A) correctiveB) detectiveC) preventiveD) mitigatingE) backupPage 312. A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.A) risk assessmentB) backplaneC) mitigating control factor analysisD) control verification worksheetE) control test plan13. A(n) _________ is something of value and can be either hardware or software.A) assetB) service level agreementC) threatD) security planE) network design14. A(n) ____________, is an information system that is critical to the survival of an organization.A) network planB) accounting systemC) IDSD) mission critical applicationE) firewall15. A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.A) assetB) service level agreementC) threatD) security planPage 4E) network design16. Threat of intrusion comes more from ____________.A) governmentB) crackersC) outside the of organizationD) both inside and outside of the organizationE) inside of the organization17. The key principle in preventing disruption, destruction and disaster is ___________.A) redundancyB) control spreadsheetC) IDSD) anti-virus softwareE) prevention controls18. A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.A) network cloaking deviceB) backup punch card readerC) uninterruptible power supplyD) service level agreementE) help desk19. A (n) ______ is a special type of virus that spreads itself without human intervention.A) snakeB) wormC) Trojan horsePage 5D) boot sector virusE) stealth virus20. A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.A) denial-of-service attackB) service level agreementC) virusD) spammingE) scamming21. Which of the following is not a type of intruder who attempts to gain intrusion to computer networks?A) Delphi team memberB) script kiddiesC) crackersD) professional hackersE) organization employees22. Which of the following is not a method for deterring intrusion?A) training end users not to divulge passwordsB) using a smart card in conjunction with a password to gain access to a computer systemC) using biometric devices to gain access to a computer systemD) using a security software package that logs out users if that user is 'idle' for a certainamount of timeE) performing social engineeringPage 623. The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.A) dial-up access through a modemB) intranetC) extranetD) WANE) none of the above24. Which of the following type of media is least susceptible to eavesdropping?A) fiber opticsB) twisted pairC) microwaveD) infraredE) coaxial cable25. Which of the following type of media is most susceptible to eavesdropping?A) unshielded twisted pairB) shielded twisted pairC) coaxial cableD) infraredE) fiber optics26. For Ethernet networks, a _______ hub can make eavesdropping more difficult.A) secureB) Trojan horseC) proxyD) spoofingE) spammingPage 727. Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?A) locks on network circuits after working hoursB) passwords that disable the screen and keyboard of a computerC) secured network cabling behind walls and above ceilingsD) use of armored cableE) unlocked wiring closet for network devices28. A sniffer program is a:A) type of macro-virusB) small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or locationC) used in a call-back modemD) a program that records all LAN messages received for later (unauthorized) analysisE) secure hub program29. The use of a(n) _________ prevents unauthorized intruders from accessing a computer network because the host or server will only permit access via inbound calling from prespecified phone numbers.A) Automatic number identificationB) network cloaking deviceC) call-back codecD) Trojan horseE) call-forward modem30. With ANI security control, the network manager:A) uses the Authorization Notation


View Full Document

WU BU 309 - Study Notes

Documents in this Course
Load more
Download Study Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Study Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?