Network security, quiz: Lessons 1 - 4

Did you find our Administrator Academy lessons on network security useful? Take this quiz to see what you learned.

Did you find our Administrator Academy lessons on network security useful? Take this quiz to see what you learned.

  1. Most enterprises implement several basic security measures. Which of the following is NOT a common security practice?
    1. Content monitoring
    2. Fault tolerance
    3. Firewall
    4. Intrusion-detection system

    Answer:
    http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci214456,00.html

  2. It is important for companies to have this document, which states how the company plans to protect the company's physical and information technology assets.
    Answer:
    http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci920802,00.html

  3. A firewall determines what traffic is allowed through it based on this:
    1. Point-to-point protocol
    2. Channel bank
    3. Rule base
    4. Number portability

    Answer:
    http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci214601,00.html

  4. There are two types of these systems: host-based and network-based.
    Answer:
    http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci921356,00.html

  5. This is a utility that records the path through the Internet between your computer and a specified destination computer. It is effective for mapping the network for security purposes.
    Answer:
    http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci213209,00.html

  6. A network ________ puts the computer's network interface card (NIC) into promiscuous mode. In this mode, the NIC picks up all the traffic on its subnet regardless of whether it was meant for it.
    Answer:
    http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci213016,00.html

  7. This practice allows you to discover places where an intruder could gain access to your network:
    1. Clickstream analysis
    2. Site mirroring
    3. Subnetting
    4. Port scanning

    Answer:
    http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci939914,00.html

  8. According to lesson four, the most flexible operating system to use for penetration testing is ______.
    Answer:
    http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci212482,00.html

  9. An attacker pretending to be someone from the IT department and asking a user to reset his password is an example of:
    1. Social engineering
    2. Data cleansing
    3. Telemetry
    4. Virtual hosting

    Answer:
    http://searchnetworking.techtarget.com/sDefinition/0,,sid14_gci531120,0.html

  10. An attacker will install this to ensure that the next time he tries to access your network he will be able to get in, even if you have found his original point of entry and plugged the hole.
    Answer:
    http://searchsecurity.techtarget.com/ateQuestionNResponse/0,289625,sid14_cid397047_tax285454,00.html
This was first published in March 2004

Dig deeper on Network Administration

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close