Network Security Measures

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What are file access rights also known as?

file permissions

What is the purpose of a transaction log in network security?

to identify unusual activity and potential threats to data security

What is the primary purpose of creating backups of files?

to have a copy of one or more files stored on a different storage device

How does a Virtual Private Network (VPN) ensure secure data transmission?

<p>by encrypting the data sent over the public network</p> Signup and view all the answers

What is one scenario in which an individual might use a VPN?

<p>to access their employer's network when working from home</p> Signup and view all the answers

What is recorded in a transaction log?

<p>all network activity</p> Signup and view all the answers

What is the primary reason for encrypting data transmitted through a wireless network?

<p>To protect the data in transit from unauthorized access.</p> Signup and view all the answers

What is a major security flaw of the Wireless Encryption Protocol (WEP) method?

<p>It uses the same key for every device on the wireless network, making it possible for hackers to crack the key.</p> Signup and view all the answers

What is the advantage of Wi-Fi Protected Access (WPA) over Wireless Encryption Protocol (WEP)?

<p>WPA generates a new key for each device on the wireless network and for each data packet sent.</p> Signup and view all the answers

What is an 'eavesdropper' in the context of network security?

<p>An unauthorized person or piece of software that intercepts data from a private communication.</p> Signup and view all the answers

What is the purpose of transaction logs in network security?

<p>To track and monitor data transactions for security and auditing purposes.</p> Signup and view all the answers

Why are firewalls important for securing network resources and data?

<p>To block unauthorized access to the network and prevent malicious activities.</p> Signup and view all the answers

Flashcards are hidden until you start studying

Use Quizgecko on...
Browser
Browser