

Network Administration Exam Bank
Course Introduction
Network Administration is an essential course that introduces students to the principles and practices involved in managing and maintaining computer networks. The course covers key topics such as network architectures, protocols, hardware, and software configuration. Students learn how to install, configure, and troubleshoot networking devices, manage user access and security, and ensure network reliability and performance. The course also emphasizes practical skills in monitoring network activity, implementing backup procedures, and responding to network issues, preparing students for real-world roles in IT infrastructure management.
Recommended Textbook
Security+ Guide to Network Security Fundamentals 4th Edition by Mark Ciampa
Available Study Resources on Quizplus
14 Chapters
588 Verified Questions
588 Flashcards
Source URL: https://quizplus.com/study-set/1054

Page 2

Chapter 1: Introduction to Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20875
Sample Questions
Q1) ____ are a loose-knit network of attackers, identity thieves, and financial fraudsters.
A) Cybercriminals
B) Cyberterrorists
C) Computer spies
D) Hackers
Answer: A
Q2) An example of a(n) ____________________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user's knowledge or permission.
Answer: vulnerability
Q3) Under the ____, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
A) HIPAA
B) HLPDA
C) HCPA
D) USHIPA
Answer: A
To view all questions and flashcards with answers, click on the resource link above.
3
Chapter 2: Malware and Social Engineering Attacks
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20876
Sample Questions
Q1) Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
A)True
B)False
Answer: True
Q2) What is malware?
Answer: Malware is software that enters a computer system without the user's knowledge or consent and then performs an unwanted-and usually harmful-action. Malware is a general term that refers to a wide variety of damaging or annoying software programs. One way to classify malware is by its primary objective. Some malware has the primary goal of rapidly spreading its infection, while other malware has the goal of concealing its purpose. Another category of malware has the goal of making a profit for its creators.
Q3) Removing a rootkit from an infected computer is extremely difficult.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Application and Network Attacks
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20877
Sample Questions
Q1) Web application attacks are considered ____ attacks.
A) client-side
B) hybrid
C) server-side.
D) relationship
Answer: C
Q2) A ____ attack is similar to a passive man-in-the-middle attack.
A) replay
B) hijacking
C) denial
D) buffer overflow
Answer: A
Q3) The SQL injection statement ____ erases the database table.
A) whatever'; DROP TABLE members; --
B) whatever'; DELETE TABLE members; --
C) whatever'; UPDATE TABLE members; --
D) whatever'; RENAME TABLE members; --
Answer: A
Q4) The predecessor to today's Internet was a network known as ____________________.
Answer: ARPAnet
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Vulnerability Assessment and Mitigating Attacks
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20878
Sample Questions
Q1) Describe the purpose of a honeypot.
Q2) The goal of ____ is to better understand who the attackers are, why they attack, and what types of attacks might occur.
A) threat mitigation
B) threat profiling
C) risk modeling
D) threat modeling.
Q3) Describe a penetration testing report.
Q4) The first step in a vulnerability assessment is to determine the assets that need to be protected.
A)True
B)False
Q5) ____ is a means by which an organization can transfer the risk to a third party who can demonstrate a higher capability at managing or reducing risks.
A) Insourcing
B) Outsourcing
C) Outcasting
D) Inhousing
Q6) List and describe the three categories that TCP/IP divides port numbers into.
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Host, Application, and Data Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20879
Sample Questions
Q1) ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
A) Biometric locks
B) Cipher locks
C) Multifactor locks
D) Reaction locks
Q2) Instead of using a key or entering a code to open a door, a user can display a ____ to identify herself.
A) logical token
B) physical sensor
C) physical token
D) hybrid sensor
Q3) Describe a mantrap.
Q4) Securing a restricted area by erecting a barrier is called ____.
A) blocking
B) boundary placement
C) fencing
D) moating
Q5) Describe how a DLP can be configured.
Q6) Explain how tailgate sensors work.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Network Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20880
Sample Questions
Q1) A(n) ____ encrypts all data that is transmitted between the remote device and the network.
A) IKE tunnel
B) VPN
C) endpoint
D) router
Q2) In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____.
A) bastion
B) choke
C) DMZ
D) reduction point
Q3) Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.
Q4) NAT replaces a private IP address with a(n) ____________________ IP address.
Q5) The OSI model breaks networking steps down into a series of six layers.
A)True
B)False
Q6) List and describe two advantages of a proxy server.
Q7) Discuss the two advantages that NAT provides.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Administering a Secure Network
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20881
Sample Questions
Q1) ____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.
A) Portability
B) Virtualization
C) Availability
D) Migration assistance
Q2) ____ is used to relay query messages.
A) ICMP
B) FTP
C) UDP
D) TCP
Q3) ____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Q4) A ____ forwards packets across computer networks.
A) bridge
B) router
C) switch
D) hub
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Wireless Network Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20882
Sample Questions
Q1) Describe a piconet.
Q2) Bluetooth devices are not backward compatible with previous versions. A)True
B)False
Q3) Discuss how to prevent bluesnarfing.
Q4) A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
A) random
B) sanctioned
C) rogue
D) legitimate
Q5) The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.
A) Bluetooth v2.1
B) Bluetooth v1.2
C) Bluetooth v 1.0
D) Bluetooth v 1.1
Q6) When a wireless device looks for beacon frames it is known as
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Access Control Fundamentals
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20883
Sample Questions
Q1) A shield icon warns users if they attempt to access any feature that requires UAC permission.
A)True
B)False
Q2) Describe the Bell-LaPadula model.
Q3) ____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
A) Separation of duties
B) Job rotation
C) Mandatory vacation
D) Role reversal
Q4) The most restrictive access control model is ____.
A) Mandatory Access Control
B) Role Based Access Control
C) Discretionary Access Control
D) Rule Based Access Control
Q5) Describe the MAC lattice model.
Q6) Describe the two key elements of the MAC model.
Q7) List two major access control models.
To view all questions and flashcards with answers, click on the resource link above. Page 11
Chapter 10: Authentication and Account Management
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20884
Sample Questions
Q1) A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
Q2) ____ accepts spoken words for input as if they had been typed on the keyboard.
A) Text recognition
B) Speech differentiation
C) Linguistic recognition
D) Speech recognition
Q3) A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
Q4) ____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
A) OpenAuth
B) OAuth
C) SAML
D) Kerberos
Q5) Discuss the focus of the OS vendors developing trusted OSs.
Q6) Describe how rainbow tables work.
Q7) Discuss the weaknesses of OpenID.

Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Basic Cryptography
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20885
Sample Questions
Q1) A hash that is created from a set of data can be reversed.
A)True
B)False
Q2) The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.
A) AES
B) RSA
C) Twofish
D) Blowfish
Q3) A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
Q4) Describe how a block cipher works.
Q5) List and describe the characteristics a hashing algorithm must have to be considered secure.
Q6) Describe how Message Digest2 (MD2) works.
Q7) NTRUEncrypt uses ____ cryptography that relies on a set of points in space.
A) matrix-based
B) lattice-based
C) linear
D) quantum
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Advanced Cryptography
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20886
Sample Questions
Q1) ____ certificates enable clients connecting to the Web server to examine the identity of the server's owner.
A) Personal digital
B) Public digital
C) Private digital
D) Server digital
Q2) In SSH, the ____________________ command allows a user to copy files between remote computers.
Q3) Key ____________________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time.
Q4) List three general duties of a CA.
Q5) List three pieces of information a digital certificate typically contains.
Q6) TLS is an extension of ____.
A) Telnet
B) HTTP
C) SSL
D) FTP
Q7) In SSH, the ____________________ command allows a user to log on to a remote computer.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Business Continuity
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20887
Sample Questions
Q1) According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics.
A) 65
B) 75
C) 85
D) 95
Q2) Identify two scenarios that could be used in a BIA.
Q3) What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
Q4) ____ pertains only to the last sector of a file.
A) Disk slack
B) RAM slack
C) ROM slack
D) Edge slack
Q5) ____________________ is data about data.
Q6) Explain how to best capture volatile data.
Q7) Describe what happens when the response team arrives and secures the crime scene.
Q8) Describe the purpose of a disaster recovery plan.
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Risk Mitigation
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20888
Sample Questions
Q1) Education in an enterprise is limited to the average employee.
A)True
B)False
Q2) A ____ is a written document that states how an organization plans to protect the company's information technology assets.
A) security policy
B) guideline
C) security procedure
D) standard
Q3) ____ are generally considered to be the most important information security policies.
A) Acceptable use policies
B) Encryption policies
C) Data loss policies
D) VPN policies
Q4) Most organizations follow a three-phase cycle in the development and maintenance of a security policy.
A)True
B)False
Q5) List one reason why social networking sites are popular with attackers.
Page 16
To view all questions and flashcards with answers, click on the resource link above.