Question: This particular document describes the rules governing access to a companys information resources, enforcement, and steps taken if rules are breached Complex security policy b.Network

This particular document describes the rules governing access to a companys information resources, enforcement, and steps taken if rules are breached

Complex security policy

b.Network security policy

c.Domain security policy

d.Company security rules

2. In reference to levels of security, which one is the least desirable when you want viable security measures in place for a large company?

a. Highly restrictive security policies

Moderately restrictive security policies

Somewhat restrictive security policies

Open security policies

3. When configuring password requirements in a Windows environment, which option prevents a user from reusing a password before the user has created a specified number of passwords over a period of time

a. Enforce password history

b. Impose password history

c. Apply password history

d. Implement password history

4. (Choose true or false) Its ok to use passwords based on your logon name or a pets name as long as you have a number as part of the password

5. Name two methods an employee can bring a virus into a network:

6. (choose true or false) A common use of restricting logon hours is to disallow logon during a system backup

7. name the application which probes a host for open ports. This application is often used by administrators to verify security policies of their networks.

8. A hardware or software tool which is used to capture and analyze data traffic over a communication channel, is known as a?

9. In reference to security features, controlling who has access to a network is known as ________ and what users can then do once logged in as known as ________.

Authentication, permission

Verification, authorization

c. Authentication, authorization

d. Validation, authorization

10. What type of security allows administrators to assign file and folder permissions defining the level of access to users or groups?

a. File system security

b. File scheme security

c. File structure security

d. File folder security

11. There are several basic items needed that will help in the writing of a security policy. Which of theme explains for what purposes network resources can be used?

12. In reference to levels of security, which one supports the most stringent authentication methods?

13. When Using IPsec to Secure Network Data, a _________ which is a series of letters, numbers, and special characters that two devices use to authenticate identities, can be used to make their transactions secure

14. What is the significance of a tunnel being used in a virtual private network?

15. In reference to mobile users VPN benefits, list a benefit found in your PowerPoint content

16. Which wireless security method works well in a small network restricting network access to computers with specific MAC addresses:

Service set identifier filtering

b. MAC address sifting

c. MAC address filtering

d. IP address filtering

17. In reference to a firewall which allows only certain packets to enter the network, a _______________ which is installed in an OS, inspects all packets coming into or leaving the computer.

a. Software firewall

b. Hardware firewall

c. OS firewall

d. Domain firewall

18. In reference to detecting malicious movements, what is a honeypot?

19. (choose true or false) A program that spreads by replicating itself into other programs or documents is a virus and a worm is a type of malware that requires another file to spread

20. The form of malware that activates based upon a particular event, like a holiday, is known as a(n).

21. Spyware is a type of malware that monitors or controls part of your computer at the expense of your privacy. What does it cause?

22. When a person drives around through a neighborhood trying to gain access to a wireless network for illicit purposes, they are known as a?

23. This form of an attack on a machine or even a network is to make the resource(s) unavailable to their intended users, or temporarily suspend services. It is analogous to a group of people crowding the entry door to a bus, and not letting passengers through.

a. A denial-of-service attack

b. A negation-of-service attack

c. A refusal-of-service attack

d. A service suspended attack

Part 4 - Additional Questions.Please complete the following questions.(1 point each)

True or False: Server rooms should be equipped with power thats preferably on a circuit separate from other electrical devices.

Which policy explains the manner in which security compliance or violations can be verified and what consequences a violation should have?

Acceptable use policy

Privacy policy

Auditing policy

Data protection policy

What are the four characteristics of a complex password policy?

What is a program that sends a large number of ping packets to a host?

Part 5.Please complete the following questions from pages 409-412.(1 point each)

Which of the following is a technique you can use to help secure a wireless network?

a. IP subnetting

b. MAC address filtering and WPA2

c. SSID broadcast

Which phrase from the following list best completes this sentence? If theres access to the equipment, theres no ___________________.

a. physical security

b. network monitoring

c. data integrity

d. security policy

If you want to prevent password guessing to foil intruders, you should enable which of the following?

a. Account lockout

b. Password expiration

c. Password disabling

d. Account policies

Which authentication protocol is used in a Windows domain environment?

a. AES

b. Kerberos

c. EAP

d. MS-CHAP v2

Which VPN mode should you use if you want to establish a secure tunnel between a main office and a branch office?

a. Client-to-gateway

b. Site-to-site

c. Site to gateway

d. Host to site

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!