Network Administration Exam Bank - 588 Verified Questions

Page 1


Network Administration Exam Bank

Course Introduction

Network Administration is an essential course that introduces students to the principles and practices involved in managing and maintaining computer networks. The course covers key topics such as network architectures, protocols, hardware, and software configuration. Students learn how to install, configure, and troubleshoot networking devices, manage user access and security, and ensure network reliability and performance. The course also emphasizes practical skills in monitoring network activity, implementing backup procedures, and responding to network issues, preparing students for real-world roles in IT infrastructure management.

Recommended Textbook

Security+ Guide to Network Security Fundamentals 4th Edition by Mark Ciampa

Available Study Resources on Quizplus

14 Chapters

588 Verified Questions

588 Flashcards

Source URL: https://quizplus.com/study-set/1054

Page 2

Chapter 1: Introduction to Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20875

Sample Questions

Q1) ____ are a loose-knit network of attackers, identity thieves, and financial fraudsters.

A) Cybercriminals

B) Cyberterrorists

C) Computer spies

D) Hackers

Answer: A

Q2) An example of a(n) ____________________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user's knowledge or permission.

Answer: vulnerability

Q3) Under the ____, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

A) HIPAA

B) HLPDA

C) HCPA

D) USHIPA

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: Malware and Social Engineering Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20876

Sample Questions

Q1) Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.

A)True

B)False

Answer: True

Q2) What is malware?

Answer: Malware is software that enters a computer system without the user's knowledge or consent and then performs an unwanted-and usually harmful-action. Malware is a general term that refers to a wide variety of damaging or annoying software programs. One way to classify malware is by its primary objective. Some malware has the primary goal of rapidly spreading its infection, while other malware has the goal of concealing its purpose. Another category of malware has the goal of making a profit for its creators.

Q3) Removing a rootkit from an infected computer is extremely difficult.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Application and Network Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20877

Sample Questions

Q1) Web application attacks are considered ____ attacks.

A) client-side

B) hybrid

C) server-side.

D) relationship

Answer: C

Q2) A ____ attack is similar to a passive man-in-the-middle attack.

A) replay

B) hijacking

C) denial

D) buffer overflow

Answer: A

Q3) The SQL injection statement ____ erases the database table.

A) whatever'; DROP TABLE members; --

B) whatever'; DELETE TABLE members; --

C) whatever'; UPDATE TABLE members; --

D) whatever'; RENAME TABLE members; --

Answer: A

Q4) The predecessor to today's Internet was a network known as ____________________.

Answer: ARPAnet

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Vulnerability Assessment and Mitigating Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20878

Sample Questions

Q1) Describe the purpose of a honeypot.

Q2) The goal of ____ is to better understand who the attackers are, why they attack, and what types of attacks might occur.

A) threat mitigation

B) threat profiling

C) risk modeling

D) threat modeling.

Q3) Describe a penetration testing report.

Q4) The first step in a vulnerability assessment is to determine the assets that need to be protected.

A)True

B)False

Q5) ____ is a means by which an organization can transfer the risk to a third party who can demonstrate a higher capability at managing or reducing risks.

A) Insourcing

B) Outsourcing

C) Outcasting

D) Inhousing

Q6) List and describe the three categories that TCP/IP divides port numbers into.

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Host, Application, and Data Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20879

Sample Questions

Q1) ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.

A) Biometric locks

B) Cipher locks

C) Multifactor locks

D) Reaction locks

Q2) Instead of using a key or entering a code to open a door, a user can display a ____ to identify herself.

A) logical token

B) physical sensor

C) physical token

D) hybrid sensor

Q3) Describe a mantrap.

Q4) Securing a restricted area by erecting a barrier is called ____.

A) blocking

B) boundary placement

C) fencing

D) moating

Q5) Describe how a DLP can be configured.

Q6) Explain how tailgate sensors work.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Network Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20880

Sample Questions

Q1) A(n) ____ encrypts all data that is transmitted between the remote device and the network.

A) IKE tunnel

B) VPN

C) endpoint

D) router

Q2) In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____.

A) bastion

B) choke

C) DMZ

D) reduction point

Q3) Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.

Q4) NAT replaces a private IP address with a(n) ____________________ IP address.

Q5) The OSI model breaks networking steps down into a series of six layers.

A)True

B)False

Q6) List and describe two advantages of a proxy server.

Q7) Discuss the two advantages that NAT provides.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Administering a Secure Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20881

Sample Questions

Q1) ____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.

A) Portability

B) Virtualization

C) Availability

D) Migration assistance

Q2) ____ is used to relay query messages.

A) ICMP

B) FTP

C) UDP

D) TCP

Q3) ____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Q4) A ____ forwards packets across computer networks.

A) bridge

B) router

C) switch

D) hub

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Wireless Network Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20882

Sample Questions

Q1) Describe a piconet.

Q2) Bluetooth devices are not backward compatible with previous versions. A)True

B)False

Q3) Discuss how to prevent bluesnarfing.

Q4) A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.

A) random

B) sanctioned

C) rogue

D) legitimate

Q5) The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.

A) Bluetooth v2.1

B) Bluetooth v1.2

C) Bluetooth v 1.0

D) Bluetooth v 1.1

Q6) When a wireless device looks for beacon frames it is known as

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Access Control Fundamentals

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20883

Sample Questions

Q1) A shield icon warns users if they attempt to access any feature that requires UAC permission.

A)True

B)False

Q2) Describe the Bell-LaPadula model.

Q3) ____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.

A) Separation of duties

B) Job rotation

C) Mandatory vacation

D) Role reversal

Q4) The most restrictive access control model is ____.

A) Mandatory Access Control

B) Role Based Access Control

C) Discretionary Access Control

D) Rule Based Access Control

Q5) Describe the MAC lattice model.

Q6) Describe the two key elements of the MAC model.

Q7) List two major access control models.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Authentication and Account Management

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20884

Sample Questions

Q1) A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.

Q2) ____ accepts spoken words for input as if they had been typed on the keyboard.

A) Text recognition

B) Speech differentiation

C) Linguistic recognition

D) Speech recognition

Q3) A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.

Q4) ____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.

A) OpenAuth

B) OAuth

C) SAML

D) Kerberos

Q5) Discuss the focus of the OS vendors developing trusted OSs.

Q6) Describe how rainbow tables work.

Q7) Discuss the weaknesses of OpenID.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Basic Cryptography

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20885

Sample Questions

Q1) A hash that is created from a set of data can be reversed.

A)True

B)False

Q2) The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.

A) AES

B) RSA

C) Twofish

D) Blowfish

Q3) A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.

Q4) Describe how a block cipher works.

Q5) List and describe the characteristics a hashing algorithm must have to be considered secure.

Q6) Describe how Message Digest2 (MD2) works.

Q7) NTRUEncrypt uses ____ cryptography that relies on a set of points in space.

A) matrix-based

B) lattice-based

C) linear

D) quantum

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Advanced Cryptography

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20886

Sample Questions

Q1) ____ certificates enable clients connecting to the Web server to examine the identity of the server's owner.

A) Personal digital

B) Public digital

C) Private digital

D) Server digital

Q2) In SSH, the ____________________ command allows a user to copy files between remote computers.

Q3) Key ____________________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time.

Q4) List three general duties of a CA.

Q5) List three pieces of information a digital certificate typically contains.

Q6) TLS is an extension of ____.

A) Telnet

B) HTTP

C) SSL

D) FTP

Q7) In SSH, the ____________________ command allows a user to log on to a remote computer.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Business Continuity

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20887

Sample Questions

Q1) According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics.

A) 65

B) 75

C) 85

D) 95

Q2) Identify two scenarios that could be used in a BIA.

Q3) What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?

Q4) ____ pertains only to the last sector of a file.

A) Disk slack

B) RAM slack

C) ROM slack

D) Edge slack

Q5) ____________________ is data about data.

Q6) Explain how to best capture volatile data.

Q7) Describe what happens when the response team arrives and secures the crime scene.

Q8) Describe the purpose of a disaster recovery plan.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Risk Mitigation

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20888

Sample Questions

Q1) Education in an enterprise is limited to the average employee.

A)True

B)False

Q2) A ____ is a written document that states how an organization plans to protect the company's information technology assets.

A) security policy

B) guideline

C) security procedure

D) standard

Q3) ____ are generally considered to be the most important information security policies.

A) Acceptable use policies

B) Encryption policies

C) Data loss policies

D) VPN policies

Q4) Most organizations follow a three-phase cycle in the development and maintenance of a security policy.

A)True

B)False

Q5) List one reason why social networking sites are popular with attackers.

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook