Network Security Final Exam Questions - 1076 Verified Questions

Page 1


Network Security Final Exam Questions

Course Introduction

Network Security focuses on the principles, protocols, and practices used to protect digital networks and data from unauthorized access, misuse, or attacks. The course covers foundational concepts such as cryptography, authentication, firewalls, intrusion detection and prevention systems, virtual private networks (VPNs), and secure network design. Students will explore common network vulnerabilities, threat landscapes, and emerging security technologies, as well as strategies for developing robust security policies. Through theoretical study and practical exercises, learners gain the skills necessary to identify and mitigate risks, analyze potential threats, and implement effective security solutions in real-world network environments.

Recommended Textbook

Computer Security Principles and Practice 3rd Edition by William Stallings

Available Study Resources on Quizplus

24 Chapters

1076 Verified Questions

1076 Flashcards

Source URL: https://quizplus.com/study-set/3981 Page 2

Chapter 1: Computer Systems Overview

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79973

Sample Questions

Q1) Threats are attacks carried out.

A)True

B)False

Answer: False

Q2) Misappropriation and misuse are attacks that result in ________ threat consequences.

Answer: usurpation

Q3) Data integrity assures that information and programs are changed only in a specified and authorized manner.

A)True

B)False

Answer: True

Q4) Confidentiality,Integrity,and Availability form what is often referred to as the _____.

Answer: CIA triad

Q5) Replay,masquerade,modification of messages,and denial of service are example of _________ attacks.

Answer: active

Q6) A(n)_________ is any means taken to deal with a security attack. Answer: countermeasure

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Cryptographic Tools

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79962

Sample Questions

Q1) The advantage of a stream cipher is that you can reuse keys.

A)True

B)False

Answer: False

Q2) Public-key cryptography is asymmetric.

A)True

B)False

Answer: True

Q3) There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and __________ attacks. Answer: brute-force

Q4) A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block. Answer: block cipher

Q5) Also referred to as single-key encryption,the universal technique for providing confidentiality for transmitted or stored data is __________ . Answer: symmetric encryption

Q6) Public-key encryption was first publicly proposed by __________ in 1976. Answer: Diffie and Hellman

Page 4

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: User Authentication

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79956

Sample Questions

Q1) The __________ is the pattern formed by veins beneath the retinal surface.

Answer: retinal pattern

Q2) A __________ is an individual to whom a debit card is issued.

Answer: cardholder

Q3) A host generated random number is often called a __________.

Answer: nonce

Q4) A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.

Answer: denial-of-service

Q5) Memory cards store and process data.

A)True

B)False

Answer: False

Q6) __________ systems identify features of the hand,including shape,and lengths and widths of fingers.

A)Signature

B)Fingerprint

C)Hand geometry

D)Palm print

Answer: C

Page 5

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Access Control

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79955

Sample Questions

Q1) The __________ user ID is exempt from the usual file access control constraints and has system wide access.

Q2) __________ is based on the roles the users assume in a system rather than the user's identity.

A)DAC

B)RBAC

C)MAC

D)URAC

Q3) __________ is verification that the credentials of a user or other system entity are valid.

A)Adequacy

B)Authentication

C)Authorization

D)Audit

Q4) A user may belong to multiple groups.

A)True

B)False

Q5) The basic elements of access control are: subject,__________,and access right.

Q6) X.800 defines __________ as the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Database and Cloud Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79954

Sample Questions

Q1) T F 4.The value of a primary key must be unique for each tuple of its table.

A)True

B)False

Q2) In a relational database columns are referred to as _________.

Q3) _________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Q4) The information transfer path by which unauthorized data is obtained is referred to as an ___________ channel.

Q5) A(n)__________ is a structured collection of data stored for use by one or more applications.

A)attribute

B)database

C)tuple

D)inference

Q6) A __________ is a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.

Q7) The __________ cloud infrastructure is operated solely for an organization.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Malicious Software

Available Study Resources on Quizplus for this Chatper

44 Verified Questions

44 Flashcards

Source URL: https://quizplus.com/quiz/79953

Sample Questions

Q1) A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.

Q2) Many forms of infection can be blocked by denying normal users the right to modify programs on the system.

A)True

B)False

Q3) Keyware captures keystrokes on a compromised system.

A)True

B)False

Q4) A bot propagates itself and activates itself,whereas a worm is initially controlled from some central facility.

A)True

B)False

Q5) Malicious software aims to trick users into revealing sensitive personal data.

A)True

B)False

Q6) In addition to propagating,a worm usually carries some form of payload. A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Q7) A __________ is a collection of bots capable of acting in a coordinated manner.

Chapter 7: Denial-Of-Service Attacks

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79952

Sample Questions

Q1) The best defense against broadcast amplification attacks is to block the use of _______ broadcasts.

Q2) Flooding attacks take a variety of forms based on which network protocol is being used to implement the attack.

A)True

B)False

Q3) The standard protocol used for call setup in VoIP is the ________ Protocol.

Q4) ______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.

Q5) A characteristic of reflection attacks is the lack of _______ traffic.

A)backscatter

B)network

C)three-way

D)botnet

Q6) A _______ flood refers to an attack that bombards Web servers with HTTP requests.

Q7) The four lines of defense against DDoS attacks are: attack prevention and preemption,attack detection and filtering,attack source traceback and identification and _______.

9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Intrusion Detection

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79951

Sample Questions

Q1) The _________ to an IDS enables a user to view output from the system or control the behavior of the system.

Q2) Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.

A)True

B)False

Q3) The _________ module analyzes LAN traffic and reports the results to the central manager.

A)LAN monitor agent

B)host agent

C)central manager agent

D)architecture agent

Q4) ________ are decoy systems that are designed to lure a potential attacker away from critical systems.

Q5) __________ is a security service that monitors and analyzes system events for the purpose of finding,and providing real-time warning of attempts to access system resources in an unauthorized manner.

Q6) An IDS comprises three logical components: analyzers,user interface and _____.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Firewalls and Intrusion Prevention Systems

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79950

Sample Questions

Q1) ________ control controls access to a service according to which user is attempting to access it.

A)User

B)Direction

C)Service

D)Behavior

Q2) _________ matching scans incoming packets for specific byte sequences (the signature)stored in a database of known attacks.

Q3) __________ scans for attack signatures in the context of a traffic stream rather than individual packets.

A)Pattern matching

B)Protocol anomaly

C)Traffic anomaly

D)Stateful matching

Q4) The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.

Q5) Snort Inline adds three new rule types: drop,reject,and _________.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Buffer Overflow

Available Study Resources on Quizplus for this Chatper

44 Verified Questions

44 Flashcards

Source URL: https://quizplus.com/quiz/79972

Sample Questions

Q1) Traditionally the function of __________ was to transfer control to a user command-line interpreter,which gave access to any program available on the system with the privileges of the attacked program.

A)shellcode

B)C coding

C)assembly language

D)all of the above

Q2) In 2003 the _________ exploited a buffer overflow in Microsoft SQL Server 2000.

A)Slammer worm

B)Morris Internet Worm

C)Sasser worm

D)Code Red worm

Q3) Shellcode must be able to run no matter where in memory it is located.

A)True

B)False

Q4) __________ is one of the best known protection mechanisms that is a GCC compiler extension that inserts additional function entry and exit code.

Q5) __________ defenses aim to harden programs to resist attacks in new programs.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Software Security

Available Study Resources on Quizplus for this Chatper

43 Verified Questions

43 Flashcards

Source URL: https://quizplus.com/quiz/79971

Sample Questions

Q1) Defensive programming is sometimes referred to as _________.

A)variable programming

B)secure programming

C)interpretive programming

D)chroot programming

Q2) "Improper Access Control (Authorization)" is in the _________ software error category.

A)Porous Defenses

B)Allocation of Resources

C)Risky Resource Management

D)Insecure Interaction Between Components

Q3) "Failure to Preserve SQL Query Structure" is in the __________ CWE/SANS software error category.

Q4) To counter XSS attacks a defensive programmer needs to explicitly identify any assumptions as to the form of input and to verify that any input data conform to those assumptions before any use of the data.

A)True

B)False

Q5) _________ attacks are most commonly seen in scripted Web applications.

Page 13

Q6) Program input data may be broadly classified as textual or ______.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Operating System Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79970

Sample Questions

Q1) Each layer of code needs appropriate hardening measures in place to provide appropriate security services.

A)True

B)False

Q2) Manual analysis of logs is a reliable means of detecting adverse events.

A)True

B)False

Q3) ______ is a reactive control that can only inform you about bad things that have already happened.

Q4) The final step in the process of initially securing the base operating system is ________.

Q5) The ______ process makes copies of data at regular intervals for recovery of lost or corrupted data over short time periods.

A)logging

B)backup

C)hardening

D)archive

Q6) System security begins with the installation of the ________.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Trusted Computing and Multilevel Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79969

Sample Questions

Q1) _________ rules are built-in system security mechanisms that achieve the objectives of the certification rules.

Q2) When multiple categories or levels of data are defined,the requirement is referred to as __________ security.

Q3) "No write down" is also referred to as the *-property.

A)True

B)False

Q4) _________ secure is a class of system that has system resources at more than one security level and that permits concurrent access by users who differ in security clearance and need-to-know,but is able to prevent each user from accessing resources for which the user lacks authorization.

Q5) In the United States the ______ and the NSA jointly operate the Common Criteria Evaluation and Validation Scheme.

Q6) The _________ model is intended to deal with the case in which there is data that must be visible to users at multiple or all security levels but should only be modified in controlled ways by authorized agents.

Q7) "No read up" is also referred to as the _________ property.

Q8) An object is said to have a security ________ of a given level.

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: It Security Management and Risk Assessment

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79968

Sample Questions

Q1) A threat may be either natural or human made and may be accidental or deliberate.

A)True

B)False

Q2) The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems.

A)combined

B)informal

C)baseline

D)detailed

Q3) The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives.

A)risk register

B)corporate security policy

C)vulnerability source

D)threat assessment

Q4) A(n)_________ is anything that has value to the organization.

Q5) Not proceeding with the activity or system that creates the risk is _________.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: It Security Controls,plans,and Procedures

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79967

Sample Questions

Q1) A _________ on an organization's IT systems identifies areas needing treatment.

Q2) An IT security plan should include details of _________.

A)risks

B)recommended controls

C)responsible personnel

D)all of the above

Q3) The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.

A)asset management

B)business continuity management

C)information security incident management

D)physical and environmental security

Q4) All controls are applicable to all technologies.

A)True

B)False

Q5) ________ controls involve the correct use of hardware and software security capabilities in systems.

Q6) Contingency planning falls into the _________ class of security controls.

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Physical and Infrastructure Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79966

Sample Questions

Q1) The most essential element of recovery from physical security breaches is ____.

Q2) Human-caused threats can be grouped into the following categories: unauthorized physical access,theft,_________ and misuse.

Q3) ______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.

Q4) Tornados,tropical cyclones,earthquakes,blizzards,lightning,and floods are all types of ________ disasters.

Q5) Physical security must also prevent any type of physical access or intrusion that can compromise logical security.

A)True

B)False

Q6) ________ includes data processing and storage equipment,transmission and networking facilities,and offline storage media.

A)Supporting facilities

B)Physical facilities

C)Information system hardware

D)Infrastructure facilities

Q7) _______ threats encompass threats related to electrical power and electromagnetic emission.

18

To view all questions and flashcards with answers, click on the resource link above.

Chapter 17: Human Resources Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79965

Sample Questions

Q1) A(n)________ is any file or object found on a system that might be involved in probing or attacking systems and networks or that is being used to defeat security measures.

Q2) The _______ category is a transitional stage between awareness and training.

A)roles and responsibilities relative to IT systems

B)security basics and literacy

C)education and experience

D)security awareness

Q3) Employee behavior is not a critical concern in ensuring the security of computer systems.

A)True

B)False

Q4) The principal problems associated with employee behavior are errors and omissions,_______,and actions by disgruntled employees.

Q5) The principles that should be followed for personnel security are: limited reliance on key employees,separation of duties,and _______.

Q6) After security basics and literacy,training becomes focused on providing the knowledge,skills,and abilities specific to an individual's _______ relative to IT systems.

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Security Auditing

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79964

Sample Questions

Q1) Thresholding is a form of baseline analysis.

A)True

B)False

Q2) The basic audit objective is to establish accountability for system entities that initiate or participate in security-relevant events and actions.

A)True

B)False

Q3) The ______ repository contains the auditing code to be inserted into an application.

Q4) Event and audit trail analysis software,tools,and interfaces may be used to analyze collected data as well as for investigating data trends and anomalies.

A)True

B)False

Q5) All UNIX implementations will have the same variants of the syslog facility.

A)True

B)False

Q6) ______ is UNIX's general-purpose logging mechanism found on all UNIX variants and Linux.

Page 20

To view all questions and flashcards with answers, click on the resource link above.

Chapter 19: Legal and Ethical Aspects

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79963

Sample Questions

Q1) A servicemark is the same as a trademark except that it identifies and distinguishes the source of a service rather than a product.

A)True

B)False

Q2) _____ strengthens the protection of copyrighted materials in digital format.

A)HIPPA

B)DMCA

C)WIPO

D)DRM

Q3) ________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.

A)Anonymity

B)Pseudonymity

C)Unobservability

D)Unlinkability

Q4) The purpose of the privacy functions is to provide a user protection against discovery and misuse of identity by other users.

A)True

B)False

Q5) The three types of patents are: utility patents,design patents,and ________.

Page 21

To view all questions and flashcards with answers, click on the resource link above.

Chapter 20: Symmetric Encryption and Message

Confidentiality

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79961

Sample Questions

Q1) Plaintext is the scrambled message produced as output.

A)True

B)False

Q2) Cryptographic systems are generically classified by _________.

A)the type of operations used for transforming plaintext to ciphertext

B)the number of keys used

C)the way in which the plaintext is processed

D)all of the above

Q3) A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.

A)True

B)False

Q4) _________ is the original message or data that is fed into the algorithm as input.

A)Plaintext

B)Encryption algorithm

C)Decryption algorithm

D)Ciphertext

Q5) A symmetric encryption scheme has five ingredients: plaintext,encryption algorithm,ciphertext,decryption algorithm and _________.

To view all questions and flashcards with answers, click on the resource link above. Page 22

Chapter 21: Public-Key Cryptography and Message

Authentication

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79960

Sample Questions

Q1) SHA-1 is considered to be very secure.

A)True

B)False

Q2) The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size,thereby reducing processing overhead.

A)ECC

B)MD5

C)Diffie-Hellman

D)none of the above

Q3) HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths.

A)True

B)False

Q4) The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.

A)SHA-1

B)HMAC

C)MD5

D)RSA

To view all questions and flashcards with answers, click on the resource link above. Page 23

Chapter 22: Internet Security Protocols and Standards

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79959

Sample Questions

Q1) ________ is a security enhancement to the MIME Internet e-mail format standard,based on technology from RSA Data Security.

Q2) Transport mode provides protection primarily for lower-layer protocols.

A)True

B)False

Q3) The ________ function consists of encrypted content of any type and encrypted-content encryption keys for one or more recipients.

A)clear-signed data

B)signed data

C)enveloped data

D)signed and enveloped data

Q4) An ADMD is an Internet e-mail provider.

A)True

B)False

Q5) MIME is an extension to the old RFC 822 specification of an Internet mail format.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 24

Chapter 23: Internet Authentication Applications

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79958

Sample Questions

Q1) ______ is the set of hardware,software,people,policies,and procedures needed to create,manage,store,distribute,and revoke digital certificates based on asymmetric cryptography.

Q2) ________ is a process where authentication and permission will be passed on from one system to another,usually across multiple enterprises,reducing the number of authentications needed by the user.

A)Integration

B)Registration

C)Synchronization

D)Federation

Q3) Federated identity management makes use of a number of standards that provide the building blocks for secure identity information exchange across different domains or heterogeneous systems.

A)True

B)False

Q4) An obvious security risk is that of impersonation.

A)True

B)False

Q5) In a generic identity management architecture a ________ is an identity holder.

To view all questions and flashcards with answers, click on the resource link above. Page 25

Chapter 24: Wireless Network Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/79957

Sample Questions

Q1) The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.

A)DoS

B)man-in-the-middle

C)network injection

D)identity theft

Q2) A ________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.

A)pre-shared key

B)master session key

C)pairwise master key

D)group master key

Q3) There are two types of keys: ________ used for communication between a STA and an AP and group keys used for multicast communication.

Q4) Company wireless LANs or wireless access points to wired LANs in close proximity may create overlapping transmission ranges.

A)True

B)False

Q5) Like TKIP,CCMP provides two services: message integrity and ________.

To view all questions and flashcards with answers, click on the resource link above. Page 26

Turn static files into dynamic content formats.

Create a flipbook