DispersedNet
SiteMap
Network Admin
Unix Admin
System Admin
Network Security
Security Standards
«Prev
Next»
Network Security Overview
Security Standards
Security Characteristics
Security System Threat
Social Engineering
Effective Security Systems
Planning Security Policy
System Security Policy
Creating Policy
Organizational Training
Security Standards
Security Basics - Quiz
Effective Security Structure
Important Security Elements
Security Services Standards
Security Definitions
Security Standards
Key Authentification Techniques
Authentication Methods - Quiz
Access Control
Encrypting Decrypting Data
Encryption Methods-
Applied Encryption Processes
Encryption Authentication Processes
Overall Security Plan
Security Elements Conclusion
Securing Protocol Layers
TCP/IP Network
Physical Data Link
IP Internet Layer
TCP/UDP
Application Layer
TCP/IP Applications
Packet Construction
IP Datagrams
TPC/IP Stack Conclusion
Protocol Layers - Quiz
Securing Resources
OS Security
Protecting TCP/IP
OS Security Quiz
Securing Resources Services
Firewalls in Depth
What is Firewall
Packet Filters
Circuit Level Gateways
Application Gateway
Bastion Host Firewall
Common Firewall Designs
Strategies Goals
Firewall Types
Security Networks Basics - Quiz
Each question is worth one point. Select the best answer or answers for each question.
1.
Statistics show that many companies connected to the Internet are not sufficiently secure. Why not?
Please select all the correct answers.
A.
Many companies do not have a written security policy in place.
B.
Many companies do not have physical security for the company networks
C.
Many companies have insufficient protection between the Internet and company networks.
D.
Many companies have insufficient information about the traffic over the company networks.
2.
The use of proper security techniques can
Please select all the correct answers.
A.
Minimize the threat of attackers
B.
Allow access to unauthorized users
C.
Prevent most hackers from accessing your system
D.
Provide 100 percent security
3.
The characteristics of an effective security system are that the system is
Please select all the correct answers.
A.
Difficult to use, so that prevents access
B.
Highly secure, easy to use, flexible, and scalable
C.
One that provides comprehensive alarming and reporting
D.
Capable of ensuring that there is no hacker activity
4.
An intentional hole in a firewall or security apparatus that allows access around security measures is called a
Please select the best answer.
A.
Back door
B.
Buffer overflow
C.
Front door
D.
Trojan horse
5.
When planning a security policy for your company, you should
Please select all the correct answers.
A.
Establish Level III security for your publicly exposed servers
B.
Train only your administrators about your security implementation
C.
Classify your systems and assign risk factors
D.
Define the access and activities that are unacceptable
6.
Network permissions should be established so that users can accomplish their tasks, but cannot access any system resources that are not necessary so that
Please select the best answer.
A.
A hacker cannot steal a legitimate user's identity
B.
Users will not have access to and misuse system resources
C.
Hackers will not pose as legitimate users
D.
Only the resources authorized for that user will be at risk