30 Questions
What is the main purpose of network security?
To prevent unauthorized access and attacks on a computer network
What type of attacks involve changing or modifying the content of messages?
Active Attacks
Which aspect of security does a passive attack pose a danger to?
Confidentiality
What is the primary concern in an active attack?
Integrity and availability compromise
Why are security breaches considered expensive?
In terms of business disruption and financial losses
In which type of attack is the victim typically not informed about the attack?
Passive Attacks
What does authenticity refer to in the field of information security?
Verifying the genuineness of documents and data
Which stage of an attack involves an attacker trying to gain root or administrator access?
Gaining Unauthorized Access
Why is it important to verify all parties in a transaction?
To reduce instances of fraud
What is the purpose of network probing in the stages of an attack?
Assessing which systems are alive
Which action reduces instances of fraud by misrepresentation?
Verifying all parties in a transaction
What is the primary aim of an attacker in capturing the network during an attack?
Attacking other systems in the network
How can attackers make it difficult for Security Administrators to determine the source of an attack?
By using poorly secured or incorrectly configured proxy servers
Which technique can be employed to evade detection by an Intrusion Detection System (IDS) that relies on 'pattern matching'?
Changing the data used in the attack slightly
In terms of security control implementation, which category includes policy and procedural controls?
Administrative controls
What type of controls are described as electronic, hardware, and software controls?
Physical controls
If attackers change the data in their attacks to avoid detection, what method are they utilizing?
Pattern matching evasion
Which type of control involves mechanical aspects in security implementation?
Physical controls
What is the primary reason for the increasing popularity of networks that use internet links?
To reduce costs compared to dedicated leased lines
Which of the following best describes the term 'Interception' in the context of information security?
Unauthorized user gaining access to a service
What is the main focus of the CIA Triad in information security?
Confidentiality, Integrity, and Availability
What does the term 'Integrity' mean in the context of the CIA Triad?
Data is protected from unauthorized changes to ensure it is reliable and correct
What type of attack involves the creation of wrong or counterfeit data?
Fabrication
Which component of the CIA Triad ensures that data, objects, and resources are protected from unauthorized viewing and other access?
Confidentiality
What is the primary function of an Intrusion Detection System (IDS)?
To monitor and analyze network activities for potential intrusions
What is the main disadvantage of a Knowledge-Based IDS?
It requires significant resources for database storage
What advantage does a Behaviour-Based IDS have over a Knowledge-Based IDS?
It can detect new kinds of vulnerabilities
What is the primary function of a Network-based intrusion prevention system (NIPS)?
To monitor the entire network for suspicious traffic by analyzing protocol activity
What is the main disadvantage of a Behaviour-Based IDS?
It has a high false alarm rate
What is the primary function of a Wireless intrusion prevention system (WIPS)?
To monitor a wireless network for suspicious traffic by analyzing wireless networking protocols
Test your knowledge on the fundamentals of network security including policies, practices, preventive measures, and types of attacks. Learn about protecting computer networks from unauthorized access and threats.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free