keywords:
Bookmark and Share



Front Back
CHAPTER 1 - GENERAL SECURITY CONCEPTS Of the following types of security, which would be primarily concerened with someone stealing the server from the premises? a. physical b. operational security c. management and policy d. authentication
Physical - This would include theft, fire, and other acts that physically deny a service or information to the organization.
CHAPTER 1 - GENERAL SECURITY CONCEPTS As a Network Admin which  access methods should you recommend if it is primarily based on preestablished access and can't be changed by users?
MAC (Mandatory Access Control) is oriented toward preestablished access by network admins and can't be changed by user.
CHAPTER 1 - GENERAL SECURITY CONCEPTS Which authentication method would be ideal for an inexperienced server administrator?
RBAC
CHAPTER 1 - GENERAL SECURITY CONCEPTS Which authentication method uses KDC to accomplish authentication for users, programs, or systems?
Kerberos
CHAPTER 1 - GENERAL SECURITY CONCEPTS Which authentication method sends a challenge to the client that is encrypted and then sent back to the server?
CHAP
CHAPTER 1 - GENERAL SECURITY CONCEPTS Which authentication methods uses more than one authentication process for a logon?
Smart Card and Biometrics
CHAPTER 1 - GENERAL SECURITY CONCEPTS Which of the following IP addresses is within the private address range? a. 192.1.1.5 b. 192.168.0.10 c. 192.225.5.1 d. 192.255.255.255
B. The private address range includes IP addresses between 192.168.0.0 and 192.168.255.255
CHAPTER 1 - GENERAL SECURITY CONCEPTS  If you want to create a much larger network from scratch and want to secure the environment which of the following isn't an example of a security zone? a. Internet b. Intranet c. Extranet d. NAT
D. NAT
CHAPTER 1 - GENERAL SECURITY CONCEPTS What protocol allows for an org to present a single TCP/IP address to the internet while utilizing private IP addressing across the LAN?
NAT
CHAPTER 1 - GENERAL SECURITY CONCEPTS What is a popular method for breaking a network into smaller private networks that coexist on the same wiring but are unaware of each other?
VLAN
CHAPTER 1 - GENERAL SECURITY CONCEPTS Which of the following services would utilize a retinal scan? A.  Auditing B. Authentication C. Access Control D. Data Confidentiality
B. Authentication
CHAPTER 1 - GENERAL SECURITY CONCEPTS What technology relies on physical attibutes of the users for authnetication?
BioMetrics
CHAPTER 1 - GENERAL SECURITY CONCEPTS What technology allows a connection between two networks using a secure protocol?
Tunneling
CHAPTER 1 - GENERAL SECURITY CONCEPTS The process of identifying the value of information or equipment in an organization is referred to as which of the following?
Asset Identification
CHAPTER 1 - GENERAL SECURITY CONCEPTS To present to management the types of threats your organization could face from hackers is categorized as what type of information?
Threat Identification or assesment.
CHAPTER 1 - GENERAL SECURITY CONCEPTS What aspect of design goals would involve determining who owns a particular file?
Accountablility
CHAPTER 1 - GENERAL SECURITY CONCEPTS When a user finds a new virus on their system what is the first step in addressing and correcting this problem?
Checking the most current antivirus file definitions have been installed.
CHAPTER 1 - GENERAL SECURITY CONCEPTS What is useful in determining what was accessed during and external attack?
System Logs
CHAPTER 1 - GENERAL SECURITY CONCEPTS You want to install a server that provides web services to Internet clients. you don't want to expose your internal network to risks.  How would you accomplish this?
DMZ Server
CHAPTER 1 - GENERAL SECURITY CONCEPTS What authentication methods provides credentials that are valid only during a single session?
Tokens
x of y cards