Did you find our Administrator Academy lessons on network security useful? Take this quiz to see what you lear...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
- Most enterprises implement several basic security measures. Which of the following is NOT a common security practice?
- Content monitoring
- Fault tolerance
- Intrusion-detection system
- It is important for companies to have this document, which states how the company plans to protect the company's physical and information technology assets.
- A firewall determines what traffic is allowed through it based on this:
- Point-to-point protocol
- Channel bank
- Rule base
- Number portability
- There are two types of these systems: host-based and network-based.
- This is a utility that records the path through the Internet between your computer and a specified destination computer. It is effective for mapping the network for security purposes.
- A network ________ puts the computer's network interface card (NIC) into promiscuous mode. In this mode, the NIC picks up all the traffic on its subnet regardless of whether it was meant for it.
- This practice allows you to discover places where an intruder could gain access to your network:
- Clickstream analysis
- Site mirroring
- Port scanning
- According to lesson four, the most flexible operating system to use for penetration testing is ______.
- An attacker pretending to be someone from the IT department and asking a user to reset his password is an example of:
- Social engineering
- Data cleansing
- Virtual hosting
- An attacker will install this to ensure that the next time he tries to access your network he will be able to get in, even if you have found his original point of entry and plugged the hole.