Networking Protocols and Layers Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the Single Loss Expectancy (SLE) if the Annualized Loss Occurrence is $120,000 and the Anticipated Rate of Occurrence (ARO) is once every 10 years?

  • $12,000
  • $10,000
  • $24,000
  • $1,200 (correct)

Which of the following is NOT a type of risk strategy mentioned in the text?

  • Devolution
  • Transformation
  • Conveyance
  • Avoidance (correct)

When assigning permissions to users, which principle should you follow?

  • Manifest destiny
  • Eminent domain
  • Most privilege (correct)
  • Risk deterrence

If a system is designed to fool attackers into thinking it is unsecured, what is it called?

<p>Decoy (C)</p> Signup and view all the answers

What is the purpose of Separation of Duties policies?

<p>To reduce the risk of Burn (D)</p> Signup and view all the answers

If a fire that might damage an asset occurs once every 20 years and the asset's value would be $10,000 in parts if damaged, what would be the Annualized Loss Expectancy (ALE) for this asset?

<p>$2,500 (B)</p> Signup and view all the answers

Which layer of the TCP/IP model does the Telnet protocol operate on?

<p>Host-to-Host (D)</p> Signup and view all the answers

If you wanted to connect two networks securely over the Internet, what type of technology could you use?

<p>VPN (C)</p> Signup and view all the answers

Which access control model uses predefined access privileges assigned by the administrator?

<p>MAC (B)</p> Signup and view all the answers

What authentication method uses a Key Distribution Center (KDC)?

<p>Kerberos (B)</p> Signup and view all the answers

Which of the following is an access control method model that grants rights based on job function or position held?

<p>RBAC (A)</p> Signup and view all the answers

What method is used for a 'victim' to learn attack methods without compromising a live system?

<p>Honey Pot (B)</p> Signup and view all the answers

To run 'sniffer' software properly, what mode must the NIC in the computer running the software be set to?

<p>Promiscuous Mode (A)</p> Signup and view all the answers

What is used to monitor a network for suspect activity?

<p>Intrusion detection system (B)</p> Signup and view all the answers

What is a message from the analyzer indicating that an event of interest has occurred?

<p>Alert (C)</p> Signup and view all the answers

What is the remote access protocol, almost exclusively implemented by Cisco, that involves a central server providing remote access usernames for dial-up users?

<p>RADIUS (C)</p> Signup and view all the answers

Which of the following is a passive method of threat response?

<p>Logging the event (D)</p> Signup and view all the answers

Which Evaluation Assurance Level (EAL) indicates that the user seeks assurance for correct system operation but does not consider security threats as serious?

<p>EAL 1 (B)</p> Signup and view all the answers

Which port should be closed on systems to prevent unauthorized running of programs?

<p>80 (D)</p> Signup and view all the answers

Which IEEE standard is followed by Wireless Ethernet?

<p>IEEE 802.11 (B)</p> Signup and view all the answers

What security layer is used for wireless 802.11 connections with WAP?

<p>WIP (B)</p> Signup and view all the answers

In what kind of attack does a rogue wireless access point pretend to be a legitimate wireless service provider to intercept user-transmitted information?

<p>Evil twin (A)</p> Signup and view all the answers

Which hypervisor model requires the operating system to be up and running before it can boot?

<p>Type I (B)</p> Signup and view all the answers

What type of security attack is a result of the trusting nature of human beings?

<p>Social engineering (B)</p> Signup and view all the answers

In computer room humidity management, what is the ideal percentage that should be maintained?

<p>50% (D)</p> Signup and view all the answers

What is used to provide EMI & RFI shielding for an entire room of computer or electronic equipment?

<p>Faraday cage (B)</p> Signup and view all the answers

Which type of fire extinguisher is best suited for extinguishing a computer fire?

<p>Type C (B)</p> Signup and view all the answers

Locking the door(s) to the server room involves what kind of security?

<p>Physical (D)</p> Signup and view all the answers

Which of the following is NOT a goal of information security?

<p>Archival (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

More Like This

Network Protocols and IP Addressing Quiz
5 questions
Data Transmission on WAN and TCP/IP Protocols
72 questions
DCCN-II Networking Concepts Quiz
45 questions
Use Quizgecko on...
Browser
Browser