Name:     ID: 
 
    Email: 

CNG 131 Chapter 13

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

It is extremely important for system administrator to protect the integrity and availability of operating systems from outside threats.
 

 2. 

Subscriptions to mailing lists can enable administrators to receive important security-related announcements and keep up with new developments and updates specific to their systems.
 

 3. 

It is important to make sure the new installations are compatible with planned upgrades.
 

 4. 

Generally speaking, firmware is programming that is inserted into programmable random access memory (programmable RAM), thus becoming a permanent part of a computing device.
 

 5. 

An organization's network security policy should require that the routing configuration of a firewall system be performed in an environment that includes the organization's production network.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 6. 

A file in a format that the computer can directly run is called a(n):
a.
source file
c.
executable file
b.
object file
d.
run file
 

 7. 

A file that is computer-readable but not human-readable format is called a(n):
a.
binary file
c.
text file
b.
source file
d.
All of the above
 

 8. 

What is used by a company that wants to host its own Internet services without sacrificing unauthorized access to its private network?
a.
BIOS
c.
ACL
b.
FTP
d.
DMZ
 

 9. 

What is the central module of an operating system called?
a.
core
c.
interface
b.
kernel
d.
plug-in
 

 10. 

As it relates to packet information, the information contained within the packet itself is called:
a.
intrinsic
c.
hardened
b.
extrinsic
d.
None of the above
 

 11. 

What is the series of notes about the Internet that began in 1969 called?
a.
SMTP
c.
SNA
b.
RFC
d.
spoofing
 

 12. 

What is the protocol for sending e-mail messages between servers called?
a.
SASL
c.
SMTP
b.
SNA
d.
SNMP
 

 13. 

What is a destructive program that masquerades as a benign application called?
a.
spoofing
c.
smurf
b.
sniffing
d.
trojan horse
 

 14. 

What is the name of a worldwide bulletin board system that can be access through the Internet called?
a.
ICMP
c.
WWBBS
b.
USENET
d.
All of the above
 

 15. 

What is the name of the network attack that floods it with useless traffic?
a.
virus
c.
DoS attack
b.
trojan horse
d.
spoofing
 

 16. 

What is the name of the network security breach where it is swamped with replies to ICMP requests?
a.
virus attack
c.
TLD attack
b.
spoofing attack
d.
smurf attack
 

 17. 

A new standard that will enable secure credit card transactions on the Internet is called:
a.
SSH
c.
SET
b.
S-HTTP
d.
None of the above
 

 18. 

What is the format for storing sound in files that was jointly developed by Microsoft and IBM?
a.
AVI
c.
MIDI
b.
MPEG
d.
WAV
 

 19. 

A computer network that spans a relatively large geographical area is called a(n):
a.
LAN
c.
MAN
b.
WAN
d.
All of the above
 

 20. 

A hardware or software module that adds a specific feature or service to a larger system is called a(n):
a.
plug-in
c.
kernel
b.
operating system
d.
interface
 

 21. 

What performs basic tasks, such as recognizing input from the keyboard, sending output to the monitor, and tracking files on disk?
a.
plug-in
c.
SSH
b.
interface
d.
operating system
 

 22. 

Built-in software that determines what a computer can do without accessing programs from a disk is called:
a.
ACL
c.
daemon
b.
BIOS
d.
CGI
 

 23. 

What is the set of data called that informs a computer's operating system which permissions, or access rights each user or group has to items such as directories and files?
a.
ACL
c.
CGI
b.
BIOS
d.
None of the above
 

 24. 

As it pertains to packet information, the information that exists outside the packet is called:
a.
intrinsic
c.
DMZ
b.
extrinsic
d.
FTP
 

 25. 

What is the protocol called that is used on the Internet for sending files?
a.
CGI
c.
ICMP
b.
LDAP
d.
FTP
 

Matching
 
 
Please match the best term from the list below to the most appropriate concept.
a.
executable file
e.
firewall
b.
daemon
f.
plug-in
c.
binary file
g.
intrinsic
d.
hardened
h.
extrinsic
 

 26. 

Process that runs specific operations in the background.
 

 27. 

Information that exists outside the packet.
 

 28. 

System designed to prevent unauthorized access to/from a private network.
 

 29. 

Process of making application software secure by ensuring that it contains security enabling technology.
 

 30. 

Hardware or software module that adds a specific feature or service to a larger system.
 
 
Please match the best term from the list below to the most appropriate concept.
a.
kernel
e.
MIDI
b.
intrinsic
f.
WAV
c.
extrinsic
g.
trojan horse
d.
interface
h.
virus
 

 31. 

Destructive program that masquerades as a benign application.
 

 32. 

Format for storing sound in files developed jointly by Microsoft and IBM.
 

 33. 

Central module of an operating system.
 

 34. 

Boundary across which two independent system meet and communicate with each other.
 

 35. 

Information contained within the packet itself.
 



 
Submit          Reset Help