CND: Principles of Computer Network Defence
10 Questions
0 Views

CND: Principles of Computer Network Defence

Created by
@KidFriendlySquirrel

Questions and Answers

What is the primary function of antivirus software?

  • To create network policies
  • To dissolve malware and protect files from corruption (correct)
  • To monitor internet traffic
  • To prevent unauthorized access to files
  • A Demilitarized Zone (DMZ) is meant to facilitate unrestricted access to a company's LAN.

    False

    What are access control tools used for in a network?

    To implement restrictions to resources in a network

    Firewalls help execute _______ policies for communication in the network.

    <p>security</p> Signup and view all the answers

    Match the following security concepts with their descriptions:

    <p>Anti-Virus = Dissolves malware and protects files DMZ = Protects LAN from untrusted networks Access Control Tools = Implements resource restrictions Firewall = Filters out unwanted network traffic</p> Signup and view all the answers

    What is the primary purpose of Computer Network Defence (CND)?

    <p>To identify, analyze, detect and protect network resources</p> Signup and view all the answers

    Confidentiality guarantees that unauthorized users can never access sensitive data.

    <p>True</p> Signup and view all the answers

    What are the five principles of Information Assurance (IA)?

    <p>Availability, Confidentiality, Integrity, Non-Repudiation, Authentication</p> Signup and view all the answers

    ______ ensures that no data can be edited or deleted without proper authorization.

    <p>Integrity</p> Signup and view all the answers

    Match the following CND elements with their descriptions:

    <p>Physical Security = Protection against physical damages like fires and theft Authentication = Process of verifying user credentials Information Assurance = Principles to respond to threats effectively Non-Repudiation = Check legitimacy of digital signatures</p> Signup and view all the answers

    Study Notes

    Anti-Virus Software

    • Antivirus applications dissolve malware including worms, viruses, spyware, and adware, protecting systems from corruption and data loss.

    Demilitarized Zone (DMZ)

    • A DMZ safeguards a company's local area network (LAN) from untrusted networks and controls outside traffic.

    Access Control Tools

    • These tools impose restrictions on network resources to prevent unauthorized access and hinder Man In The Middle attacks.

    Firewalls

    • Firewalls execute security policies for network communication and filter out unwanted traffic to maintain security.

    Computer Network Defense (CND)

    • CND focuses on identifying, analyzing, detecting, and protecting network resources from unauthorized activity and threats.

    Information Assurance (IA)

    • IA principles guide responses to threats, assessing the need for action based on the security situation.

    Principles of Information Assurance (A.C.I.N.A)

    • Availability: Ensures sensitive data is accessible when needed.
    • Confidentiality: Limits access to authorized users, requiring authentication for sensitive information.
    • Integrity: Prevents unauthorized alterations or deletions of data.
    • Non-Repudiation: Guarantees the legitimacy of digital signatures to confirm authenticity.
    • Authentication: Verifies a user's identity by comparing entered credentials with existing data.

    CND Elements

    • Tools and techniques used to enhance network security, ensuring comprehensive protection.

    Physical Security

    • Protects against physical threats such as fire, theft, and vandalism, securing tangible assets like network devices and computers.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the essential principles of Computer Network Defence (CND) and the role of Information Assurance in network security. Participants will learn about identifying, analyzing, and protecting network resources from unwanted activities and threats. Test your knowledge on how to enforce these principles effectively.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser