Networking Protocols and Layers Quiz
29 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the Single Loss Expectancy (SLE) if the Annualized Loss Occurrence is $120,000 and the Anticipated Rate of Occurrence (ARO) is once every 10 years?

  • $12,000
  • $10,000
  • $24,000
  • $1,200 (correct)
  • Which of the following is NOT a type of risk strategy mentioned in the text?

  • Devolution
  • Transformation
  • Conveyance
  • Avoidance (correct)
  • When assigning permissions to users, which principle should you follow?

  • Manifest destiny
  • Eminent domain
  • Most privilege (correct)
  • Risk deterrence
  • If a system is designed to fool attackers into thinking it is unsecured, what is it called?

    <p>Decoy</p> Signup and view all the answers

    What is the purpose of Separation of Duties policies?

    <p>To reduce the risk of Burn</p> Signup and view all the answers

    If a fire that might damage an asset occurs once every 20 years and the asset's value would be $10,000 in parts if damaged, what would be the Annualized Loss Expectancy (ALE) for this asset?

    <p>$2,500</p> Signup and view all the answers

    Which layer of the TCP/IP model does the Telnet protocol operate on?

    <p>Host-to-Host</p> Signup and view all the answers

    If you wanted to connect two networks securely over the Internet, what type of technology could you use?

    <p>VPN</p> Signup and view all the answers

    Which access control model uses predefined access privileges assigned by the administrator?

    <p>MAC</p> Signup and view all the answers

    What authentication method uses a Key Distribution Center (KDC)?

    <p>Kerberos</p> Signup and view all the answers

    Which of the following is an access control method model that grants rights based on job function or position held?

    <p>RBAC</p> Signup and view all the answers

    What method is used for a 'victim' to learn attack methods without compromising a live system?

    <p>Honey Pot</p> Signup and view all the answers

    To run 'sniffer' software properly, what mode must the NIC in the computer running the software be set to?

    <p>Promiscuous Mode</p> Signup and view all the answers

    What is used to monitor a network for suspect activity?

    <p>Intrusion detection system</p> Signup and view all the answers

    What is a message from the analyzer indicating that an event of interest has occurred?

    <p>Alert</p> Signup and view all the answers

    What is the remote access protocol, almost exclusively implemented by Cisco, that involves a central server providing remote access usernames for dial-up users?

    <p>RADIUS</p> Signup and view all the answers

    Which of the following is a passive method of threat response?

    <p>Logging the event</p> Signup and view all the answers

    Which Evaluation Assurance Level (EAL) indicates that the user seeks assurance for correct system operation but does not consider security threats as serious?

    <p>EAL 1</p> Signup and view all the answers

    Which port should be closed on systems to prevent unauthorized running of programs?

    <p>80</p> Signup and view all the answers

    Which IEEE standard is followed by Wireless Ethernet?

    <p>IEEE 802.11</p> Signup and view all the answers

    What security layer is used for wireless 802.11 connections with WAP?

    <p>WIP</p> Signup and view all the answers

    In what kind of attack does a rogue wireless access point pretend to be a legitimate wireless service provider to intercept user-transmitted information?

    <p>Evil twin</p> Signup and view all the answers

    Which hypervisor model requires the operating system to be up and running before it can boot?

    <p>Type I</p> Signup and view all the answers

    What type of security attack is a result of the trusting nature of human beings?

    <p>Social engineering</p> Signup and view all the answers

    In computer room humidity management, what is the ideal percentage that should be maintained?

    <p>50%</p> Signup and view all the answers

    What is used to provide EMI & RFI shielding for an entire room of computer or electronic equipment?

    <p>Faraday cage</p> Signup and view all the answers

    Which type of fire extinguisher is best suited for extinguishing a computer fire?

    <p>Type C</p> Signup and view all the answers

    Locking the door(s) to the server room involves what kind of security?

    <p>Physical</p> Signup and view all the answers

    Which of the following is NOT a goal of information security?

    <p>Archival</p> Signup and view all the answers

    More Like This

    Network Protocols and IP Addressing Quiz
    5 questions
    TCP Protocol Stack - Layer 2 Overview
    23 questions
    TCP/IP and OSI Model Overview
    37 questions
    Data Transmission on WAN and TCP/IP Protocols
    72 questions
    Use Quizgecko on...
    Browser
    Browser