Name:     ID: 
 
    Email: 

CNG 131 Chapter 01

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

The introduction of firewalls in 1995 allowed successful businesses to balance security with simple outbound access to the Internet.
 

 2. 

Identity theft is a crime in which one person masquerades under the identity of another.
 

 3. 

Availability is defined as the continuous operation of computing systems.
 

 4. 

The FBI estimates every year U.S. companies lose up to $100 billion in business profits because of information theft.
 

 5. 

An intrusion detection system (IDS) provides 24/7 network surveillance.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 6. 

What are the connections called that transmit and receive data using radio frequencies or RF connections?
a.
Broadband
c.
Denial-of-Service Attacks
b.
Wireless Access
d.
TCP/IP
 

 7. 

Which of the following computer and network technologies have intrinsic security weaknesses?
a.
TCP/IP
c.
Network Equipment
b.
Operating Systems
d.
All of the Above
 

 8. 

Which of the following weaknesses can cause security problems?
a.
Installations that follow policy
c.
Lack of a written security policy
b.
Minimal turnover of staff
d.
A disaster recover plan
 

 9. 

What is an example of concise access controls that are not applied?
a.
Using "Cisco" as the password on a Cisco router
b.
Changing network logons every 90 days
c.
Forcing user passwords contain at least one number
d.
All of the above
 

 10. 

An example of a disgruntled employee would be one who as been:
a.
Fired
c.
Reprimanded
b.
Laid off
d.
All of the above
 

 11. 

Which of the following is (are) incorrect about firewalls?
a.
Restricts access to specific network resources
b.
Contains built-in filters
c.
Creates a protective layer between the network and the outside world
d.
Is a hardware only solution
 

 12. 

Examples of access controls might be:
a.
Smartcards
c.
Security token
b.
PINs
d.
All of the above
 

 13. 

An unauthorized access to a network is called a(n):
a.
Authentication
c.
Encryption
b.
Confidentiality
d.
Threat
 

 14. 

The purpose of network security is to:
a.
Keep the good guys in
c.
Protect your assets
b.
Keep the bad guys out
d.
Both B and C
 

 15. 

A program for exposing usernames and passwords is called a(n):
a.
Virus
c.
Trojan Horse
b.
Sniffer
d.
SNMP
 

 16. 

What does network security encompass?
a.
Securing data
c.
Securing users
b.
Securing applications
d.
All of the above
 

 17. 

Controlling access to critical network applications, data, and services is called :
a.
Security assessment
c.
Perimeter security
b.
Access control
d.
Encryption
 

 18. 

A crime in which one person masquerades under the identity of another is called:
a.
Identity theft
c.
Confidentiality
b.
Integrity
d.
All of the above
 

 19. 

A destructive program that masquerades as a benign application is called a(n):
a.
Virus
c.
Sniffer
b.
Trojan horse
d.
Both A and B
 

 20. 

The firewall can be augmented by which of the following methods:
a.
Intrusion detection
c.
Vulnerability assessment
b.
Authentication
d.
All of the above
 

 21. 

If a computer system is down for any period of time, it might cause:
a.
Lack of credibility
c.
Lost revenues
b.
Lower customer satisfaction
d.
All of the above
 

 22. 

What is one of the goals of security?
a.
Limit confidentiality
c.
Assure availability
b.
Increase system downtime
d.
Reduce integrity
 

 23. 

Which of the following is not a primary cause of network security threats?
a.
Human Error
c.
Policy Weaknesses
b.
Encryption
d.
Configuration Weaknesses
 

 24. 

Company proprietary information that is sensitive in nature also needs to remain:
a.
Confidential
c.
Unsafe
b.
Widely available
d.
Unsecure
 

Matching
 
 
Please match the best term from the list below to the most appropriate question.
a.
Snoops
e.
Firewalls
b.
Privacy
f.
Availability
c.
Confidentiality
g.
Integrity
d.
Identity Theft
h.
Encryption
 

 25. 

Protection of data from unauthorized disclosure to a third party.
 

 26. 

Where one person masquerades under the identity of another.
 

 27. 

Ensures messages cannot be intercepted or read by anyone other than their intended audience.
 

 28. 

Main focus for organization that have had to expend considerable effort to respond to the new requirements imposed by recent legislation.
 

 29. 

Individuals who take part in corporate espionage by gaining unauthorized access to confidential data and providing this data to others.
 
 
Please match the best term from the list below to the most appropriate question.
a.
Ignorance
b.
Trojan Horse
c.
Intrusion Detection System
d.
Extranet
e.
Denial-of-Service Attacks
f.
Authenticate
g.
TCP/IP
h.
Sniffers
 

 30. 

Provides 24/7 network surveillance.
 

 31. 

Engulfs network equipment with useless noise which can slow down or crash a system.
 

 32. 

Delivery vehicle for destructive code.
 

 33. 

Program for monitoring network activity.
 

 34. 

Security method based on the idea that each individual user has unique information that sets them apart from others.
 



 
Submit          Reset Help