Networking Protocols and Layers Quiz

ColorfulCatharsis avatar
ColorfulCatharsis
·
·
Download

Start Quiz

Study Flashcards

29 Questions

What is the Single Loss Expectancy (SLE) if the Annualized Loss Occurrence is $120,000 and the Anticipated Rate of Occurrence (ARO) is once every 10 years?

$1,200

Which of the following is NOT a type of risk strategy mentioned in the text?

Avoidance

When assigning permissions to users, which principle should you follow?

Most privilege

If a system is designed to fool attackers into thinking it is unsecured, what is it called?

Decoy

What is the purpose of Separation of Duties policies?

To reduce the risk of Burn

If a fire that might damage an asset occurs once every 20 years and the asset's value would be $10,000 in parts if damaged, what would be the Annualized Loss Expectancy (ALE) for this asset?

$2,500

Which layer of the TCP/IP model does the Telnet protocol operate on?

Host-to-Host

If you wanted to connect two networks securely over the Internet, what type of technology could you use?

VPN

Which access control model uses predefined access privileges assigned by the administrator?

MAC

What authentication method uses a Key Distribution Center (KDC)?

Kerberos

Which of the following is an access control method model that grants rights based on job function or position held?

RBAC

What method is used for a 'victim' to learn attack methods without compromising a live system?

Honey Pot

To run 'sniffer' software properly, what mode must the NIC in the computer running the software be set to?

Promiscuous Mode

What is used to monitor a network for suspect activity?

Intrusion detection system

What is a message from the analyzer indicating that an event of interest has occurred?

Alert

What is the remote access protocol, almost exclusively implemented by Cisco, that involves a central server providing remote access usernames for dial-up users?

RADIUS

Which of the following is a passive method of threat response?

Logging the event

Which Evaluation Assurance Level (EAL) indicates that the user seeks assurance for correct system operation but does not consider security threats as serious?

EAL 1

Which port should be closed on systems to prevent unauthorized running of programs?

80

Which IEEE standard is followed by Wireless Ethernet?

IEEE 802.11

What security layer is used for wireless 802.11 connections with WAP?

WIP

In what kind of attack does a rogue wireless access point pretend to be a legitimate wireless service provider to intercept user-transmitted information?

Evil twin

Which hypervisor model requires the operating system to be up and running before it can boot?

Type I

What type of security attack is a result of the trusting nature of human beings?

Social engineering

In computer room humidity management, what is the ideal percentage that should be maintained?

50%

What is used to provide EMI & RFI shielding for an entire room of computer or electronic equipment?

Faraday cage

Which type of fire extinguisher is best suited for extinguishing a computer fire?

Type C

Locking the door(s) to the server room involves what kind of security?

Physical

Which of the following is NOT a goal of information security?

Archival

Test your knowledge of networking protocols and layers with this quiz. Identify routing protocols, understand TCP/IP concepts, and determine the layers at which different protocols function.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Routing Protocols
10 questions

Routing Protocols

TriumphalMorganite avatar
TriumphalMorganite
Routing Protocols and Autonomous Systems Quiz
15 questions
Use Quizgecko on...
Browser
Browser