Tip

Network security, quiz: Lessons 1 - 4

Did you find our Administrator Academy lessons on network security useful? Take this quiz to see what you learned.

  1. Most enterprises implement several basic security measures. Which of the following is NOT a common security practice?
    1. Content monitoring
    2. Fault tolerance
    3. Firewall
    4. Intrusion-detection system

    Answer:

    Requires Free Membership to View

  1. http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci214456,00.html

  2. It is important for companies to have this document, which states how the company plans to protect the company's physical and information technology assets.
    Answer:
    http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci920802,00.html

  3. A firewall determines what traffic is allowed through it based on this:
    1. Point-to-point protocol
    2. Channel bank
    3. Rule base
    4. Number portability

    Answer:
    http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci214601,00.html

  4. There are two types of these systems: host-based and network-based.
    Answer:
    http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci921356,00.html

  5. This is a utility that records the path through the Internet between your computer and a specified destination computer. It is effective for mapping the network for security purposes.
    Answer:
    http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci213209,00.html

  6. A network ________ puts the computer's network interface card (NIC) into promiscuous mode. In this mode, the NIC picks up all the traffic on its subnet regardless of whether it was meant for it.
    Answer:
    http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci213016,00.html

  7. This practice allows you to discover places where an intruder could gain access to your network:
    1. Clickstream analysis
    2. Site mirroring
    3. Subnetting
    4. Port scanning

    Answer:
    http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci939914,00.html

  8. According to lesson four, the most flexible operating system to use for penetration testing is ______.
    Answer:
    http://searchnetworking.techtarget.com/gDefinition/0,294236,sid7_gci212482,00.html

  9. An attacker pretending to be someone from the IT department and asking a user to reset his password is an example of:
    1. Social engineering
    2. Data cleansing
    3. Telemetry
    4. Virtual hosting

    Answer:
    http://searchnetworking.techtarget.com/sDefinition/0,,sid14_gci531120,0.html

  10. An attacker will install this to ensure that the next time he tries to access your network he will be able to get in, even if you have found his original point of entry and plugged the hole.
    Answer:
    http://searchsecurity.techtarget.com/ateQuestionNResponse/0,289625,sid14_cid397047_tax285454,00.html

    This was first published in March 2004

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.