Access Control Fundamentals
249 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of Access Control?

  • To collect legitimate account names on a system
  • To ensure resources are only granted to entitled users (correct)
  • To execute program code embedded in web pages
  • To monitor system activity for malicious behavior
  • What is an Access Control List (ACL)?

  • A security service that provides protection of system resources
  • A task in Access Management that involves monitoring access
  • A mechanism that implements access control for a system resource (correct)
  • A type of virus that infects a system
  • What is the main function of an Access Control Service?

  • To maintain access information
  • To collect legitimate account names on a system
  • To provide protection of system resources against unauthorized access (correct)
  • To execute program code embedded in web pages
  • What is the purpose of an Access Matrix?

    <p>To represent subjects and objects with privileges listed in each cell</p> Signup and view all the answers

    What is ACK Piggybacking?

    <p>The practice of sending an ACK inside another packet going to the same destination</p> Signup and view all the answers

    What is the primary function of Activity Monitors?

    <p>To monitor system activity for malicious behavior and block it</p> Signup and view all the answers

    What is the primary characteristic of a circuit-switched network?

    <p>A single continuous physical circuit connects two endpoints</p> Signup and view all the answers

    What is the main purpose of a cloud computing system?

    <p>To utilize remote servers for data storage and management</p> Signup and view all the answers

    Which type of disaster recovery site is the most expensive option?

    <p>Hot site</p> Signup and view all the answers

    What is the term for the unauthorized disclosure of information?

    <p>Confidentiality</p> Signup and view all the answers

    What is the purpose of a Computer Emergency Response Team (CERT)?

    <p>To provide incident response services and publish security alerts</p> Signup and view all the answers

    What is the term for the process of exchanging data between an HTTP server and a client?

    <p>Cookie exchange</p> Signup and view all the answers

    What is the primary goal of a cost-benefit analysis in the context of security?

    <p>To compare the cost of implementing countermeasures with the value of the reduced risk</p> Signup and view all the answers

    What is the term for the threat action that undesirably alters system operation?

    <p>Corruption</p> Signup and view all the answers

    What is the purpose of a client in a network?

    <p>To request and use services provided by other systems</p> Signup and view all the answers

    What is the term for the process of detecting and responding to security incidents?

    <p>Incident response</p> Signup and view all the answers

    What is the primary purpose of a Distance Vector?

    <p>To determine the cost of routes to all known networks</p> Signup and view all the answers

    What is Domain Hijacking?

    <p>A type of DNS attack that blocks access to a domain's DNS server</p> Signup and view all the answers

    What is the purpose of a Domain Name System (DNS)?

    <p>To translate domain names into IP addresses</p> Signup and view all the answers

    What is Due Care?

    <p>The minimal level of protection in place in accordance with industry best practices</p> Signup and view all the answers

    What is the purpose of DumpSec?

    <p>To dump a variety of information about a system's users and permissions</p> Signup and view all the answers

    What is the primary purpose of Dynamic Routing Protocols?

    <p>To allow network devices to learn routes</p> Signup and view all the answers

    What is Eavesdropping?

    <p>Listening to a private conversation to gain unauthorized access</p> Signup and view all the answers

    What is the purpose of an Echo Request?

    <p>To determine if a machine is online and how long traffic takes to get to it</p> Signup and view all the answers

    What is the primary purpose of Egress Filtering?

    <p>To filter outbound traffic</p> Signup and view all the answers

    What is a Domain in Windows NT and Windows 2000?

    <p>A set of network resources for a group of users</p> Signup and view all the answers

    What is the primary purpose of a firewall?

    <p>To provide a physical or logical barrier to unauthorized access</p> Signup and view all the answers

    What is the goal of flooding an attack?

    <p>To provide more input than the system can process properly</p> Signup and view all the answers

    What is a forest in the context of Active Directory?

    <p>A set of domains that replicate their databases with each other</p> Signup and view all the answers

    What is the purpose of a fork bomb?

    <p>To create a new process by using the fork() call and take up all available processes</p> Signup and view all the answers

    What is the purpose of fingerprinting?

    <p>To send strange packets to a system to determine its operating system</p> Signup and view all the answers

    Which protocol is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP)?

    <p>Border Gateway Protocol (BGP)</p> Signup and view all the answers

    What is the process of simultaneously sending the same message to multiple recipients?

    <p>Broadcast</p> Signup and view all the answers

    What is a standard code of practice that provides guidance on how to secure an information system?

    <p>British Standard 7799</p> Signup and view all the answers

    What is a unit of data transmitted over an ATM network?

    <p>Cell</p> Signup and view all the answers

    What is a cryptographic algorithm for encryption and decryption?

    <p>Cipher</p> Signup and view all the answers

    What is a client computer program that can retrieve and display information from servers on the World Wide Web?

    <p>Browser</p> Signup and view all the answers

    What is the encrypted form of the message being sent?

    <p>Ciphertext</p> Signup and view all the answers

    What is a business plan that outlines emergency response, backup operations, and post-disaster recovery steps?

    <p>Business Continuity Plan (BCP)</p> Signup and view all the answers

    What is a technique used to trick a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions?

    <p>Cache Cramming</p> Signup and view all the answers

    What is a value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data?

    <p>Checksum</p> Signup and view all the answers

    What is the primary function of the Address Resolution Protocol (ARP)?

    <p>To map an Internet Protocol address to a physical machine address</p> Signup and view all the answers

    What is the main characteristic of Asymmetric Cryptography?

    <p>It employs a pair of keys, a public key and a private key</p> Signup and view all the answers

    What is the purpose of Auditing in the context of information security?

    <p>To gather and analyze information to ensure policy compliance and security</p> Signup and view all the answers

    What is the definition of Availability in the context of information security?

    <p>The need to ensure that the business purpose of the system can be met</p> Signup and view all the answers

    What is the purpose of a Backdoor in the context of information security?

    <p>To give an attacker easier access to a compromised system</p> Signup and view all the answers

    What is the definition of Bandwidth in the context of information security?

    <p>The capacity of a communication channel to pass data through the channel in a given amount of time</p> Signup and view all the answers

    What is the purpose of a Banner in the context of information security?

    <p>To display system information to a remote user</p> Signup and view all the answers

    What is the definition of Biometrics in the context of information security?

    <p>The use of physical characteristics to determine access</p> Signup and view all the answers

    What is the purpose of a Boot Record Infector?

    <p>To insert malicious code into the boot sector of a disk</p> Signup and view all the answers

    What is the definition of Basic Authentication in the context of information security?

    <p>The simplest web-based authentication scheme that works by sending the username and password with each request</p> Signup and view all the answers

    What is the primary purpose of an Intrusion Prevention System (IPS)?

    <p>To prevent intruders from gaining further access to a computer network</p> Signup and view all the answers

    What is the purpose of a covert channel?

    <p>To communicate information in a covert fashion using normal system operations</p> Signup and view all the answers

    What is crimineware?

    <p>A type of malware used by cyber criminals to make money off an infected system</p> Signup and view all the answers

    What is the purpose of a cron job?

    <p>To run jobs for users and administrators at scheduled times of the day</p> Signup and view all the answers

    What is the purpose of a crossover cable?

    <p>To connect devices directly together</p> Signup and view all the answers

    What is cryptanalysis?

    <p>The mathematical science of analyzing a cryptographic system to gain knowledge needed to break or circumvent the protection</p> Signup and view all the answers

    What is the purpose of a cyclic redundancy check (CRC)?

    <p>To implement data integrity service where accidental changes to data are expected</p> Signup and view all the answers

    What is a daemon?

    <p>A program that runs continuously without intervention from any of the users on the system</p> Signup and view all the answers

    What is data aggregation?

    <p>The ability to get a more complete picture of the information by analyzing several different types of records at once</p> Signup and view all the answers

    What is the purpose of a data custodian?

    <p>To take responsibility for the data and ensure its security</p> Signup and view all the answers

    What is the primary characteristic of a connectionless protocol?

    <p>Each datagram or packet is self-contained without reliance on earlier exchanges</p> Signup and view all the answers

    What is the 'Day Zero' in the context of computer security?

    <p>The day a new vulnerability is made known</p> Signup and view all the answers

    What is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack?

    <p>Decapsulation</p> Signup and view all the answers

    What is the process of transforming an encrypted message into its original plaintext?

    <p>Decryption</p> Signup and view all the answers

    What is the method of modifying the content of a website in such a way that it becomes 'vandalized' or embarrassing to the website owner?

    <p>Defacement</p> Signup and view all the answers

    What is the approach of using multiple layers of security to guard against failure of a single security component?

    <p>Defense In-Depth</p> Signup and view all the answers

    What is a network area that sits between an organization's internal network and an external network, usually the Internet?

    <p>Demilitarized Zone (DMZ)</p> Signup and view all the answers

    What is an attack that tries all of the phrases or words in a dictionary, trying to crack a password or key?

    <p>Dictionary Attack</p> Signup and view all the answers

    What is a key agreement algorithm published in 1976 by Whitfield Diffie and Martin Hellman?

    <p>Diffie-Hellman</p> Signup and view all the answers

    What is an electronic 'credit card' that establishes your credentials when doing business or other transactions on the Web?

    <p>Digital Certificate</p> Signup and view all the answers

    What is the purpose of Emanations Analysis?

    <p>To monitor and resolve signals that contain data</p> Signup and view all the answers

    What is the main characteristic of an Ephemeral Port?

    <p>It is a randomly chosen port number greater than 1023</p> Signup and view all the answers

    What is the purpose of Escrow Passwords?

    <p>To grant access to emergency personnel when privileged personnel are unavailable</p> Signup and view all the answers

    What is the primary function of Ethernet?

    <p>To connect devices to a LAN using coaxial cable or twisted pair wires</p> Signup and view all the answers

    What is the purpose of an Exponential Backoff Algorithm?

    <p>To adjust TCP timeout values on the fly</p> Signup and view all the answers

    What is the main characteristic of an Extended ACL?

    <p>It can filter based on IP addresses, ports, and protocols</p> Signup and view all the answers

    What is the primary function of the File Transfer Protocol (FTP)?

    <p>To specify a protocol for transferring files</p> Signup and view all the answers

    What is the main purpose of a Filter in a network?

    <p>To specify which packets will or will not be used</p> Signup and view all the answers

    What is the primary function of a Finger protocol?

    <p>To lookup user information on a given host</p> Signup and view all the answers

    What is an Event in a system or network?

    <p>An observable occurrence</p> Signup and view all the answers

    What is the primary goal of flooding an attack?

    <p>To cause a failure in a computer system by providing more input than it can process</p> Signup and view all the answers

    What is the purpose of a forward lookup?

    <p>To find an IP address using a domain name</p> Signup and view all the answers

    What is the result of a fork bomb attack?

    <p>The system crashes due to a lack of available processes</p> Signup and view all the answers

    What is the purpose of form-based authentication?

    <p>To authenticate users using a username and password</p> Signup and view all the answers

    What is the fragment offset field used for?

    <p>To determine where a fragment falls in relation to other fragments</p> Signup and view all the answers

    What is the purpose of a forward proxy?

    <p>To act as a server through which all requests are made</p> Signup and view all the answers

    What is the process of storing a data file in several chunks or fragments rather than in a single contiguous sequence of bits?

    <p>Fragmentation</p> Signup and view all the answers

    What is a network point that acts as an entrance to another network?

    <p>Gateway</p> Signup and view all the answers

    What is a type of duplex communications channel that carries data in both directions at once?

    <p>Full Duplex</p> Signup and view all the answers

    What is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed?

    <p>GNU</p> Signup and view all the answers

    What is an algorithm that computes a value based on a data object, thereby mapping the data object to a smaller data object?

    <p>Hash Function</p> Signup and view all the answers

    What is a type of attack that seizes control of a previously established communication association?

    <p>Hijack Attack</p> Signup and view all the answers

    What is a server name with a hostname followed by the full domain name?

    <p>Fully-Qualified Domain Name</p> Signup and view all the answers

    What is a type of file sharing utility that acts as a server and client simultaneously?

    <p>Gnutella</p> Signup and view all the answers

    What is the process of identifying and fixing vulnerabilities on a system?

    <p>Hardening</p> Signup and view all the answers

    What is a type of intrusion detection system that uses information from the operating system audit records to watch all operations occurring on the host?

    <p>Host-Based ID</p> Signup and view all the answers

    What is the primary function of an HTTP Proxy?

    <p>To act as a middleman in the communication between HTTP clients and servers</p> Signup and view all the answers

    What is the purpose of a Hybrid Attack?

    <p>To build on the dictionary attack method by adding numerals and symbols to dictionary words</p> Signup and view all the answers

    What is the primary function of Incident Handling?

    <p>To respond to security-related events such as intrusions, cyber-theft, and denial of service</p> Signup and view all the answers

    What is the purpose of Ingress Filtering?

    <p>To filter inbound traffic to a network</p> Signup and view all the answers

    What is the primary function of the Internet Control Message Protocol (ICMP)?

    <p>To report error conditions during IP datagram processing</p> Signup and view all the answers

    What is the primary function of the Internet Message Access Protocol (IMAP)?

    <p>To access and manage email messages on a mail server</p> Signup and view all the answers

    What is the purpose of Integrity in the context of information security?

    <p>To ensure that information has not been changed accidentally or deliberately</p> Signup and view all the answers

    What is the primary function of a Hub?

    <p>To repeat data received on one port to all other ports</p> Signup and view all the answers

    What is the purpose of a Hybrid Encryption?

    <p>To combine two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption</p> Signup and view all the answers

    What is the purpose of Information Warfare?

    <p>To compete between offensive and defensive players over information resources</p> Signup and view all the answers

    What is the purpose of L2TP?

    <p>To enable virtual private networks over the Internet</p> Signup and view all the answers

    What is the principle of allowing users the least amount of permissions necessary to perform their intended function?

    <p>Least Privilege</p> Signup and view all the answers

    What is a type of attack in which one system entity illegitimately poses as another entity?

    <p>Masquerade Attack</p> Signup and view all the answers

    What is the process of selectively removing log entries from a system log to hide a compromise?

    <p>Log Clipping</p> Signup and view all the answers

    What is a software protocol for enabling anyone to locate organizations and individuals in a network?

    <p>LDAP</p> Signup and view all the answers

    What is a type of cyber attack in which the attacker intercepts and relays messages between two parties?

    <p>Man-in-the-Middle Attack</p> Signup and view all the answers

    What is a one-way cryptographic hash function?

    <p>md5</p> Signup and view all the answers

    What is the term for the ability to attack or defend within an Internet environment?

    <p>Measures of Effectiveness</p> Signup and view all the answers

    What is the purpose of NAT?

    <p>To share one or a small number of publicly routable IP addresses</p> Signup and view all the answers

    What is a type of program that executes when a certain predefined event occurs?

    <p>Logic Bomb</p> Signup and view all the answers

    What is the primary function of IP Forwarding?

    <p>To allow a host to act as a router</p> Signup and view all the answers

    What is the purpose of an Intranet?

    <p>To create a private network for an organization</p> Signup and view all the answers

    What is Intrusion Detection?

    <p>A security management system for computers and networks</p> Signup and view all the answers

    What is an IP Address?

    <p>A computer's inter-network address</p> Signup and view all the answers

    What is IP Spoofing?

    <p>Supplying a false IP address</p> Signup and view all the answers

    What is the main purpose of NAT in a home or small business network?

    <p>To share a single DSL or Cable modem IP address</p> Signup and view all the answers

    What is ISO?

    <p>International Organization for Standardization</p> Signup and view all the answers

    What is a Netmask?

    <p>A 32-bit number indicating the range of IP addresses on a single network</p> Signup and view all the answers

    What is an Issue-Specific Policy?

    <p>An organizational policy that addresses specific needs</p> Signup and view all the answers

    What is Network-Based IDS?

    <p>A system that monitors network traffic for indications of attacks</p> Signup and view all the answers

    What is Jitter?

    <p>Modification of fields in a database</p> Signup and view all the answers

    What is the purpose of Non-Repudiation?

    <p>To prove that a specific user sent a message and that it hasn't been modified</p> Signup and view all the answers

    What is a Jump Bag?

    <p>A container with items necessary to respond to an incident</p> Signup and view all the answers

    What is an Octet?

    <p>A sequence of 8 bits</p> Signup and view all the answers

    What is the primary function of the Kernel?

    <p>To provide basic services for all other parts of the operating system</p> Signup and view all the answers

    What is One-Way Encryption?

    <p>An irreversible transformation of plaintext to cipher text</p> Signup and view all the answers

    What is the purpose of a Null Session?

    <p>To allow an anonymous user to retrieve information over the network</p> Signup and view all the answers

    What is Network Mapping?

    <p>To compile an electronic inventory of the systems and the services on a network</p> Signup and view all the answers

    What is Network Taps?

    <p>A device that hooks directly onto the network cable and sends a copy of the traffic to other devices</p> Signup and view all the answers

    What is Non-Printable Character?

    <p>A character that doesn't have a corresponding character letter to its ASCII code</p> Signup and view all the answers

    What is the primary function of the network layer in the OSI model?

    <p>To handle the routing of the data and forwarding</p> Signup and view all the answers

    What is the purpose of the OSI model?

    <p>To provide a standard for how messages should be transmitted between devices</p> Signup and view all the answers

    What is the main idea behind the OSI model?

    <p>To divide the communication process into layers</p> Signup and view all the answers

    What is the application layer responsible for in the OSI model?

    <p>Identifying communication partners, quality of service, and user authentication</p> Signup and view all the answers

    What is the presentation layer responsible for in the OSI model?

    <p>Converting incoming and outgoing data from one presentation format to another</p> Signup and view all the answers

    What is the transport layer responsible for in the OSI model?

    <p>Managing the end-to-end control and error-checking</p> Signup and view all the answers

    What is the session layer responsible for in the OSI model?

    <p>Setting up, coordinating, and terminating conversations between applications</p> Signup and view all the answers

    What is the primary function of OSPF?

    <p>To maintain a database of all routers in the autonomous system</p> Signup and view all the answers

    What is the characteristic of a one-way function?

    <p>Easy to compute the output based on a given input, but impossible to figure out the input value from the output value</p> Signup and view all the answers

    What is the advantage of the OSI model?

    <p>It provides a standard description for how messages should be transmitted between devices</p> Signup and view all the answers

    What is the primary function of the data-link layer?

    <p>To synchronize the physical level and perform bit-stuffing</p> Signup and view all the answers

    What is the main purpose of a packet in a packet-switched network?

    <p>To contain the destination address and data</p> Signup and view all the answers

    What is the goal of password sniffing?

    <p>To gain knowledge of passwords on a local area network</p> Signup and view all the answers

    What is pharming?

    <p>A technique used to redirect a user's session to a masquerading website</p> Signup and view all the answers

    What is the primary function of a personal firewall?

    <p>To install and run on individual PCs</p> Signup and view all the answers

    What is the purpose of a patch?

    <p>To fix bugs in existing programs</p> Signup and view all the answers

    What is the term for the actual application data a packet contains?

    <p>Payload</p> Signup and view all the answers

    What is the purpose of penetration testing?

    <p>To test the external perimeter security of a network or facility</p> Signup and view all the answers

    What is phishing?

    <p>The use of e-mails to trick a user into entering valid credentials</p> Signup and view all the answers

    What is the purpose of a ping scan?

    <p>To look for machines that are responding to ICMP Echo Requests</p> Signup and view all the answers

    What is the main purpose of Point-to-Point Tunneling Protocol (PPTP)?

    <p>To extend a corporate network through private 'tunnels' over the public Internet</p> Signup and view all the answers

    What is the effect of poison reverse in routing updates?

    <p>It sets the metrics of unreachable routes to infinity</p> Signup and view all the answers

    What is polyinstantiation?

    <p>The ability of a database to maintain multiple records with the same key</p> Signup and view all the answers

    What is the purpose of a port scan?

    <p>To learn which computer network services are available on a system</p> Signup and view all the answers

    What is possession in the context of information security?

    <p>The ability to use and control information</p> Signup and view all the answers

    What is polymorphism in the context of malicious software?

    <p>The ability to change its underlying code to avoid detection</p> Signup and view all the answers

    What is the primary function of a Post Office Protocol, Version 3 (POP3)?

    <p>To dynamically access a mailbox on a server host to retrieve mail messages</p> Signup and view all the answers

    What is the purpose of a preamble in network communications?

    <p>To define a specific series of transmission pulses to synchronize transmission timing</p> Signup and view all the answers

    What is the term for the address ranges set aside for use by private or non-Internet connected networks?

    <p>Private Address Space</p> Signup and view all the answers

    What type of malware attaches itself to existing program files?

    <p>Program Infector</p> Signup and view all the answers

    What is the purpose of a Promiscuous Mode?

    <p>To read all packets off the network, regardless of who they are addressed to</p> Signup and view all the answers

    What is the definition of a Protocol?

    <p>A formal specification for communicating</p> Signup and view all the answers

    What is the primary purpose of Public-Key Forward Secrecy?

    <p>To ensure a session key will not be compromised even if a private key is compromised</p> Signup and view all the answers

    What is the primary purpose of a Ransomware?

    <p>To encrypt a victim's hard drive and deny access to key files</p> Signup and view all the answers

    What is the purpose of a Public Key Infrastructure (PKI)?

    <p>To enable users of a basically unsecured public network to securely and privately exchange data and money</p> Signup and view all the answers

    What is the primary function of a Proxy Server?

    <p>To act as an intermediary between a workstation user and the Internet</p> Signup and view all the answers

    What is the primary purpose of a Reconnaissance?

    <p>To gather information about a target system or network</p> Signup and view all the answers

    What is the primary purpose of Reflexive ACLs?

    <p>To filter traffic based on established connections</p> Signup and view all the answers

    What is the term for a program that executes when a certain predefined event occurs?

    <p>Daemon</p> Signup and view all the answers

    What is the purpose of a Private Addressing?

    <p>To assign IP addresses to private or non-Internet connected networks</p> Signup and view all the answers

    What is the primary purpose of Radiation Monitoring?

    <p>To receive images, data, or audio from an unprotected source</p> Signup and view all the answers

    What is the primary purpose of a Response?

    <p>To send information in response to a stimulus</p> Signup and view all the answers

    What is the primary purpose of Reverse Engineering?

    <p>To disassemble and analyze the design of a system component</p> Signup and view all the answers

    What is the primary purpose of Risk Assessment?

    <p>To identify and prioritize risks</p> Signup and view all the answers

    What is the primary purpose of RARP?

    <p>To request an IP address from a gateway server</p> Signup and view all the answers

    What is the primary purpose of RSA?

    <p>To encrypt and decrypt data using asymmetric cryptography</p> Signup and view all the answers

    What is the purpose of Role-Based Access Control?

    <p>To assign users to roles based on their organizational functions</p> Signup and view all the answers

    What is a Router used for?

    <p>To forward information to other networks based on IP addresses</p> Signup and view all the answers

    What is a security mechanism that uses a cryptographic hash function?

    <p>S/Key</p> Signup and view all the answers

    What is the purpose of Secure Electronic Transactions (SET)?

    <p>To provide end-to-end security for credit card transactions online</p> Signup and view all the answers

    What is the purpose of a Server?

    <p>To provide a service in response to requests from other system entities called clients</p> Signup and view all the answers

    What is a Segment?

    <p>Another name for TCP packets</p> Signup and view all the answers

    What is Sensitive Information?

    <p>Unclassified information that, if compromised, could adversely affect the national interest</p> Signup and view all the answers

    What is a Session?

    <p>A virtual connection between two hosts by which network traffic is passed</p> Signup and view all the answers

    What is a Session Key?

    <p>A key that is temporary or is used for a relatively short period of time</p> Signup and view all the answers

    What is a Share?

    <p>A resource made public on a machine, such as a directory or printer</p> Signup and view all the answers

    What is the primary function of the Transmission Control Protocol (TCP)?

    <p>To ensure delivery of data in the correct order</p> Signup and view all the answers

    What is the purpose of Trunking in computer networks?

    <p>To connect switched together to share VLAN information</p> Signup and view all the answers

    What is the primary function of the User Datagram Protocol (UDP)?

    <p>To run on top of IP networks and provide a connectionless protocol</p> Signup and view all the answers

    What is the purpose of a Tunnel in computer networks?

    <p>To create a logical point-to-point link using encapsulation</p> Signup and view all the answers

    What is the primary function of the Uniform Resource Locator (URL)?

    <p>To provide a global address of documents and other resources on the World Wide Web</p> Signup and view all the answers

    What is the purpose of Trust in computer networks?

    <p>To determine which permissions and what actions other systems or users can perform on remote machines</p> Signup and view all the answers

    What is the primary function of the Transport Layer Security (TLS) protocol?

    <p>To ensure privacy between communicating applications and their users</p> Signup and view all the answers

    What is the purpose of a Trojan Horse in computer networks?

    <p>To appear to have a useful function, but also has a hidden and potentially malicious function</p> Signup and view all the answers

    What is the primary function of the Traceroute tool?

    <p>To map the route a packet takes from the local machine to a remote destination</p> Signup and view all the answers

    What is the purpose of Unicast in computer networks?

    <p>To broadcast from a host to a single host</p> Signup and view all the answers

    What is the primary function of a shell in a Unix system?

    <p>To understand and execute user commands</p> Signup and view all the answers

    What is the term for gaining indirect knowledge of communicated data by monitoring signals?

    <p>Signal Analysis</p> Signup and view all the answers

    What is the purpose of a smartcard?

    <p>To record and replay a set key</p> Signup and view all the answers

    What is the term for a fraudulent message sent over SMS, similar to phishing?

    <p>Smishing</p> Signup and view all the answers

    What is the purpose of a sniffer?

    <p>To monitor network traffic</p> Signup and view all the answers

    What is the primary function of a socket?

    <p>To tell a host's IP stack where to plug in a data stream</p> Signup and view all the answers

    What is the term for a protocol that a proxy server can use to accept requests from client users?

    <p>SOCKS</p> Signup and view all the answers

    What is the purpose of a source port?

    <p>To connect to a server</p> Signup and view all the answers

    What is the term for a cryptographic key that is divided into two or more separate data items?

    <p>Split Key</p> Signup and view all the answers

    What is the purpose of a standard ACL on a Cisco router?

    <p>To make packet filtering decisions based on source IP address</p> Signup and view all the answers

    What is the primary function of a switch in a network?

    <p>To keep track of MAC addresses attached to each of its ports</p> Signup and view all the answers

    What is the purpose of a subnet mask?

    <p>To determine the number of bits used for the subnet and host portions of the address</p> Signup and view all the answers

    What is the term for methods of hiding the existence of a message or other data?

    <p>Steganography</p> Signup and view all the answers

    What is the primary function of a stateful inspection firewall?

    <p>To examine the contents of a packet up to the application layer</p> Signup and view all the answers

    What is the purpose of a static host table?

    <p>To map hostname to IP address</p> Signup and view all the answers

    What is the term for a network that provides switched communications service?

    <p>Switched Network</p> Signup and view all the answers

    What is the primary function of syslog in Unix systems?

    <p>To keep track of system logs</p> Signup and view all the answers

    What is the term for a type of cipher that works by encrypting a message a single bit, byte, or computer word at a time?

    <p>Stream Cipher</p> Signup and view all the answers

    What is the primary function of a subnet in a network?

    <p>To divide a larger network into smaller parts</p> Signup and view all the answers

    What is the term for a type of attack that sends a host more TCP SYN packets than the protocol implementation can handle?

    <p>SYN Flood</p> Signup and view all the answers

    What is a person responsible for enforcement or administration of the security policy that applies to a system?

    <p>System Security Officer (SSO)</p> Signup and view all the answers

    What type of policy is written for a specific system or device?

    <p>System-Specific Policy</p> Signup and view all the answers

    What is the purpose of TCP Wrapper?

    <p>To monitor and control incoming network traffic</p> Signup and view all the answers

    What is the term for a potential for violation of security?

    <p>Threat</p> Signup and view all the answers

    What is a TCP-based, application-layer, Internet Standard protocol for remote login from one host to another?

    <p>TELNET</p> Signup and view all the answers

    What is the geometric arrangement of a computer system?

    <p>Topology</p> Signup and view all the answers

    What is a token-based device that requires a user to have a token with them when they log in?

    <p>Token-Based Device</p> Signup and view all the answers

    What is the purpose of a threat assessment?

    <p>To identify types of threats that an organization might be exposed to</p> Signup and view all the answers

    What is the name of the protocol analyzer for Unix that can monitor network traffic on a wire?

    <p>TCPDump</p> Signup and view all the answers

    What is the term for a potential to cause harm to a system?

    <p>Threat</p> Signup and view all the answers

    What is a Virtual Private Network (VPN)?

    <p>A logical, restricted-use network constructed from a physical network</p> Signup and view all the answers

    What is a characteristic of a virus in computer software?

    <p>It requires a host program to be run to become active</p> Signup and view all the answers

    What is vishing?

    <p>A phishing attack that involves voice calls or VoIP systems</p> Signup and view all the answers

    What is a benefit of using a VPN?

    <p>It is generally less expensive to build and operate than a real network</p> Signup and view all the answers

    What is the purpose of encryption in a VPN?

    <p>To improve the security of data transmission</p> Signup and view all the answers

    What is a common use case for a VPN?

    <p>Connecting multiple sites of an organization over the Internet</p> Signup and view all the answers

    What is the primary function of a Voice Firewall?

    <p>To monitor and control inbound and outbound voice network activity</p> Signup and view all the answers

    What is the purpose of a War Dialer?

    <p>To identify modems in a telephone exchange that may be susceptible to compromise</p> Signup and view all the answers

    What is the primary function of a Windowing System?

    <p>To manage windows and other graphical user interface entities</p> Signup and view all the answers

    What is the purpose of WHOIS?

    <p>To find information about resources on networks</p> Signup and view all the answers

    What is the main function of a Web Server?

    <p>To respond to HTTP requests for documents from client web browsers</p> Signup and view all the answers

    What is the primary function of War Chalking?

    <p>To mark areas that receive wireless signals</p> Signup and view all the answers

    What is the purpose of Windump?

    <p>To monitor network traffic on a wire</p> Signup and view all the answers

    What is the primary function of a Worm?

    <p>To run independently and propagate a complete working version of itself</p> Signup and view all the answers

    What is the primary function of a Zero-Day Attack?

    <p>To exploit computer application vulnerabilities that are unknown to others</p> Signup and view all the answers

    What is the primary function of WEP?

    <p>To provide a security protocol for wireless local area networks</p> Signup and view all the answers

    More Like This

    Operating System Security Chapter
    6 questions

    Operating System Security Chapter

    PrestigiousRutherfordium avatar
    PrestigiousRutherfordium
    Access Control Methods Quiz
    12 questions
    Deploying Access Lists in Linux Chapter 6
    23 questions
    Access Control Methods
    28 questions

    Access Control Methods

    RoomierDivisionism avatar
    RoomierDivisionism
    Use Quizgecko on...
    Browser
    Browser