Networking Protocols and Layers Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the Single Loss Expectancy (SLE) if the Annualized Loss Occurrence is $120,000 and the Anticipated Rate of Occurrence (ARO) is once every 10 years?

  • $12,000
  • $10,000
  • $24,000
  • $1,200 (correct)

Which of the following is NOT a type of risk strategy mentioned in the text?

  • Devolution
  • Transformation
  • Conveyance
  • Avoidance (correct)

When assigning permissions to users, which principle should you follow?

  • Manifest destiny
  • Eminent domain
  • Most privilege (correct)
  • Risk deterrence

If a system is designed to fool attackers into thinking it is unsecured, what is it called?

<p>Decoy (C)</p> Signup and view all the answers

What is the purpose of Separation of Duties policies?

<p>To reduce the risk of Burn (D)</p> Signup and view all the answers

If a fire that might damage an asset occurs once every 20 years and the asset's value would be $10,000 in parts if damaged, what would be the Annualized Loss Expectancy (ALE) for this asset?

<p>$2,500 (B)</p> Signup and view all the answers

Which layer of the TCP/IP model does the Telnet protocol operate on?

<p>Host-to-Host (D)</p> Signup and view all the answers

If you wanted to connect two networks securely over the Internet, what type of technology could you use?

<p>VPN (C)</p> Signup and view all the answers

Which access control model uses predefined access privileges assigned by the administrator?

<p>MAC (B)</p> Signup and view all the answers

What authentication method uses a Key Distribution Center (KDC)?

<p>Kerberos (B)</p> Signup and view all the answers

Which of the following is an access control method model that grants rights based on job function or position held?

<p>RBAC (A)</p> Signup and view all the answers

What method is used for a 'victim' to learn attack methods without compromising a live system?

<p>Honey Pot (B)</p> Signup and view all the answers

To run 'sniffer' software properly, what mode must the NIC in the computer running the software be set to?

<p>Promiscuous Mode (A)</p> Signup and view all the answers

What is used to monitor a network for suspect activity?

<p>Intrusion detection system (B)</p> Signup and view all the answers

What is a message from the analyzer indicating that an event of interest has occurred?

<p>Alert (C)</p> Signup and view all the answers

What is the remote access protocol, almost exclusively implemented by Cisco, that involves a central server providing remote access usernames for dial-up users?

<p>RADIUS (C)</p> Signup and view all the answers

Which of the following is a passive method of threat response?

<p>Logging the event (D)</p> Signup and view all the answers

Which Evaluation Assurance Level (EAL) indicates that the user seeks assurance for correct system operation but does not consider security threats as serious?

<p>EAL 1 (B)</p> Signup and view all the answers

Which port should be closed on systems to prevent unauthorized running of programs?

<p>80 (D)</p> Signup and view all the answers

Which IEEE standard is followed by Wireless Ethernet?

<p>IEEE 802.11 (B)</p> Signup and view all the answers

What security layer is used for wireless 802.11 connections with WAP?

<p>WIP (B)</p> Signup and view all the answers

In what kind of attack does a rogue wireless access point pretend to be a legitimate wireless service provider to intercept user-transmitted information?

<p>Evil twin (A)</p> Signup and view all the answers

Which hypervisor model requires the operating system to be up and running before it can boot?

<p>Type I (B)</p> Signup and view all the answers

What type of security attack is a result of the trusting nature of human beings?

<p>Social engineering (B)</p> Signup and view all the answers

In computer room humidity management, what is the ideal percentage that should be maintained?

<p>50% (D)</p> Signup and view all the answers

What is used to provide EMI & RFI shielding for an entire room of computer or electronic equipment?

<p>Faraday cage (B)</p> Signup and view all the answers

Which type of fire extinguisher is best suited for extinguishing a computer fire?

<p>Type C (B)</p> Signup and view all the answers

Locking the door(s) to the server room involves what kind of security?

<p>Physical (D)</p> Signup and view all the answers

Which of the following is NOT a goal of information security?

<p>Archival (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

More Like This

Network Protocols and IP Addressing Quiz
5 questions
TCP/IP and OSI Model Overview
37 questions
DCCN-II Networking Concepts Quiz
45 questions
Use Quizgecko on...
Browser
Browser