Chapter 10

10 September 2022
4.7 (114 reviews)
41 test answers

Unlock all answers in this set

Unlock answers (37)
question
(T/F) Technical controls alone, when properly configured, can secure an IT environment.
answer
False
question
(T/F) The "something you have" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.
answer
False
question
(T/F) The ability to restrict specific services is a common practice in most modern routers, and is invisible to the user.
answer
True
question
(T/F) Secure Shell (SSH) provides security for remote access connections over public networks by creating a secure and persistent connection..
answer
True
question
(T/F) The KDC component of Kerberos knows the secret keys of all clients and servers on the network.
answer
True
question
Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area?
answer
authentication
question
Which of the following is NOT among the four types of authentication mechanisms?
answer
something you see
question
Which of the following characteristics currently used today for authentication purposes is NOT considered truly unique?
answer
face representation
question
Which of the following is a criteria used to compare and evaluate biometric technologies?
answer
false reject rate
question
Which of the following biometric authentication systems is considered to be the most secure?
answer
retina pattern recognition
question
Which of the following biometric authentication systems is the most accepted by users?
answer
keystroke pattern recognition
question
Which type of firewall keeps track of each network connection established between internal and external systems?
answer
stateful inspection
question
The intermediate area between trusted and untrusted networks is referred to as which of the following?
answer
demilitarized zone
question
Which type of device allows only specific packets with a particular source, destination, and port address to pass through it.
answer
dynamic packet filtering firewalls
question
Which technology employs sockets to map internal private network addresses to a public address using a one-to-many mapping?
answer
port-address translation
question
Which of the following is true about firewalls and their ability to adapt in a network?
answer
Firewalls deal strictly with defined patterns of measured observation.
question
Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding?
answer
sending DoS packets to the source
question
Which type of IDPS is also known as a behavior-based intrusion detection system?
answer
anomaly-based
question
Which tool can identify active computers on a network?
answer
port scanner
question
What is the next phase of the preattack data gathering process after the attacker has collected all of an organization's Internet addresses?
answer
fingerprinting
question
What is the range of the well-known ports used by TCP and UDP?
answer
0-1023
question
Which port number is commonly used for the Hypertext Transfer Protocol service.
answer
80
question
Which port number is commonly used for the Simple Mail Transfer Protocol service?
answer
25
question
What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems?
answer
packet sniffer
question
Which of the following is used in conjunction with an algorithm to make computer data secure from anybody except the intended recipient of the data?
answer
key
question
In which cipher method are values rearranged within a block to create the ciphertext?
answer
permutation
question
Which of the following is true about symmetric encryption?
answer
uses a secret key to encrypt and decrypt
question
Which technology has two modes of operation: transport and tunnel?
answer
IP Security
question
Which of the following provides an identification card of sorts to clients who request services in a Kerberos system?
answer
Ticket Granting Service
question
Which of the following is a Kerberos service that initially exchanges information with the client and server by using secret keys
answer
Key Distribution Center
question
What is most commonly used for the goal of nonrepudiation in cryptography?
answer
digital signature
question
____________________ is the determination of actions that an entity can perform in a physical or logical area.
answer
Authorization
question
A(n) ____________________ is a secret word or combination of characters known only by the user.
answer
password
question
________ recognition authentication captures the analog waveforms of human speech.
answer
Voice
question
A(n) ____________________ token uses a challenge-response system in which the server challenges the user with a number, that when entered into the token provides a response that provides access.
answer
asynchronous
question
A(n) ____________________ is any device that prevents a specific type of information from moving between an untrusted network and a trusted network.
answer
firewall
question
You might put a proxy server in the __________________, which is exposed to the outside world, neither in the trusted nor untrusted network.
answer
DMZ
question
____________________ converts external IP addresses to internal IP addresses on a one-to-one basis.
answer
Network-address translation
question
____________________ presents a threat to wireless communications, a practice that makes it prudent to use a wireless encryption protocol to prevent unauthorized use of your Wi-Fi network.
answer
War driving
question
The ___________ wireless security protocol was replaced by stronger protocols due to several vulnerabilities found in the early 2000s.
answer
WEP
question
____________________ Ticket Granting Service (TGS) provides tickets to clients who request services.
answer
Kerberos