

![]()


Computer Networking Security is a comprehensive course that delves into the principles, architectures, and protocols fundamental to securing computer networks. The course explores various topics such as encryption methods, authentication mechanisms, secure network designs, firewalls, intrusion detection systems, and emerging threats in network security. Students will learn to identify vulnerabilities, implement defense strategies, and understand the role of security policies and best practices in protecting data as it traverses local and global networks. Through theoretical knowledge and practical labs, students gain hands-on experience in configuring secure networks and responding to real-world security incidents.
Recommended Textbook
CompTIA Security Guide to Network Security Fundamentals 6th Edition by Mark Ciampa
Available Study Resources on Quizplus
15 Chapters
750 Verified Questions
750 Flashcards
Source URL: https://quizplus.com/study-set/2311 Page 2

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45966
Sample Questions
Q1) Which of the following are considered threat actors? (Choose all that apply. )
A)brokers
B)competitors
C)administrators
D)individuals
Answer: A,B
Q2) Select the term that best describes automated attack software?
A)open-source utility
B)insider software
C)open-source intelligence
D)intrusion application
Answer: C
Q3) What level of security access should a computer user have to do their job?
A)password protected
B)least amount
C)limiting amount
D)authorized access
Answer: B
Q4) What are the four different risk response techniques?
Answer: Accept,transfer,avoid,and mitigate.
To view all questions and flashcards with answers, click on the resource link above. Page 3
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45967
Sample Questions
Q1) Explain how an appender infection works.
Answer: The virus first appends itself to the end of a file.It then moves the first three bytes of the original file to the virus code and replaces them with a "jump" instruction pointing to the virus code.When the program is launched,the jump instruction redirects control to the virus.
Q2) What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?
A)key indexing
B)ransomware
C)passive tracking
D)keylogger
Answer: D
Q3) A virus self-replicates on the host computer and spreads to other computers by itself.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.

4

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45968
Sample Questions
Q1) If using the MD5 hashing algorithm,what is the length to which each message is padded?
A)32 bits
B)64 bits
C)128 bits
D)512 bits
Answer: D
Q2) The XOR cipher is based on the binary operation eXclusive OR that compares two bits.
A)True
B)False
Answer: True
Q3) Explain how a hash algorithm works and how it is primarily used.
Answer: A hash algorithm creates a unique "digital fingerprint" of a set of data.This process is called hashing,and the resulting fingerprint is a digest (sometimes called a message digest or hash)that represents the contents.Hashing is used primarily for comparison purposes.
Q4) What four basic protections can cryptography support?
Answer: Cryptography can support confidentiality,integrity,authentication,and non-repudiation.
To view all questions and flashcards with answers, click on the resource link above. Page 5

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45969
Sample Questions
Q1) What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks,and each block is then encrypted separately?
A)Electronic Code Book
B)Galois/Counter
C)Cipher Block Chaining
D)Counter
Q2) What process will remove all private and public keys along with the user's identification information in the CA?
A)suspension
B)deletion
C)destruction
D)revocation
Q3) What protocol uses SSL or TLS to secure communications between a browser and a web server?
Q4) What are the three areas of protection provided by IPSEC?
Q5) List the three PKI trust models that use a CA.
Q6) Stream ciphers work on multiple characters at a time.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 6
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45970
Sample Questions
Q1) How does a cross-site request forgery (XSRF)attack work?
Q2) If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income,what type of attack are they using?
A)spoofing
B)URL hijacking
C)Web squatting
D)typo hijacking
Q3) The malicious content of an XSS URL is confined to material posted on a website
A)True
B)False
Q4) How is a network-based MITM attack executed?
Q5) What specific ways can a session token be transmitted? (Choose all that apply. )
A)In the URL.
B)In the trailer of a frame.
C)In the header of a packet.
D)In the header of the HTTP requisition.
Q6) Securing web applications is easier than protecting other systems.
A)True
B)False

Page 7
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45971
Q1) How does a Unified Threat Management (UTM)security product help reduce administrative overhead?
Q2) What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?
A)system call
B)unit call
C)hardware instruction
D)system exception
Q3) Select the technology that can be used to examine content through application-level filtering.
A)Application gateway
B)Security proxy
C)Web security gateway
D)Firewall
Q4) The OSI model breaks networking steps down into a series of six layers.
A)True
B)False
Q5) What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45972
Sample Questions
Q1) What Microsoft Windows feature prevents attackers from using buffer overflows to execute malware?
Q2) In what type of cloud computing does the customer have some control over the operating systems,storage,and their installed applications?
A)Application as a Service
B)Infrastructure as a Service
C)Software as a Service
D)System as a Service
Q3) Select the email protocols that are not secure? (Choose all that apply. )
A)TLS
B)S/MIME
C)POP
D)IMAP
Q4) What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?
A)centralized device log analyzer
B)core device log analyzer
C)network log device
D)system log manager
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45973
Sample Questions
Q1) Which encryption protocol below is used in the WPA2 standard?
A)AES-CCMP
B)AES-CTR
C)AES-TKIP
D)AES-SCMP
Q2) What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
A)active twin
B)authorized twin
C)internal replica
D)evil twin
Q3) What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?
A)Bluesnarfing
B)Bluejacking
C)Bluecracking
D)Bluetalking
Q4) How does the WPA Temporal Key Integrity Protocol encryption technology operate?
Q5) What are the four types of packets used by EAP?
Q6) What is the most common type of wireless access control?
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45974
Sample Questions
Q1) Which of the following are application development stages? (Choose all that apply. )
A)analysis
B)proofing
C)testing
D)staging
Q2) A Wi-Fi enabled microSD card is an example of what type of device?
A)PCIe
B)mobile card
C)SDIO
D)Secure Digital
Q3) Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply. )
A)Disabling unnecessary ports and services
B)Employing least functionality
C)Password auditing
D)Disabling default accounts/passwords
Q4) When securing a laptop,it can be placed in an office or a desk drawer.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45975
Sample Questions
Q1) What PIN is considered to be the most commonly used PIN?
A)1234
B)4321
C)0000
D)7777
Q2) What is the Internet of Things (IoT)?
Q3) How does BYOD increase employee performance?
Q4) Infrared light is next to the visible light on the light spectrum.
A)True
B)False
Q5) Which of the following selections is not one of the features provided by a typical MDM?
A)Rapidly deploy new mobile devices
B)Discover devices accessing enterprise systems
C)Track stolen devices
D)Enforce encryption settings
Q6) The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds.
A)True
B)False

Page 12
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45976
Sample Questions
Q1) What type of authentication is based on what the user has?
A)software token
B)hardware token
C)security token
D)identity token
Q2) The use of what item below involves the creation of a large pre-generated data set of candidate digests?
A)rainbow tables
B)randomized character list
C)word list
D)cascade tables
Q3) What federated identity management (FIM)relies on token credentials?
A)OAuth
B)OpenID
C)Shibboleth
D)OpenPass
Q4) How does a retina scanner work?
Q5) Describe how rainbow tables work.
Q6) What smartcard standard is used to cover all U.S.government employees?
Q7) What is a dictionary attack?
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45977
Sample Questions
Q1) Rule-Based Access Control can be changed by users.
A)True
B)False
Q2) Employee onboarding refers to the tasks associated with hiring a new employee.
A)True
B)False
Q3) Which of the following is a simpler subset of Directory Access Protocol?
A)SDAP
B)X.500 Lite
C)DIB
D)ADS
Q4) List three major access control models.
Q5) Which of the following controls can be implemented so an organization can configure multiple computers by setting a single policy for enforcement?
A)group-based access control
B)computer-based access control
C)role-based access control
D)system access control
Q6) Describe LDAP injection attacks.
Q7) Describe how Kerberos works.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45978
Sample Questions
Q1) Realistically,risks can never be entirely eliminated.
A)True
B)False
Q2) What process does a penetration tester rely on to access an ever higher level of resources?
A)pivot
B)spinning
C)persistence
D)continuous exploitation
Q3) Which of the following is the goal of a vulnerability scan? (Choose all that apply. )
A)identify vulnerabilities
B)identify common misconfigurations
C)identify threat actors
D)identify a lack of security controls
Q4) What is the end result of a penetration test?
A)penetration test profile
B)penetration test report
C)penetration test system
D)penetration test view
To view all questions and flashcards with answers, click on the resource link above. Page 15

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45979
Sample Questions
Q1) In what type of cluster does every server perform useful work so that if one fails,the remaining servers take on the additional load?
A)symmetric network
B)asymmetric network
C)symmetric server
D)asymmetric server
Q2) Which of the following is the sudden flow of electric current between two objects?
A)electromagnetic interference
B)Faraday interference
C)electrostatic discharge
D)electromagnetic pulse
Q3) An incident response plan is a set of written instructions for reacting to a security incident.
A)True
B)False
Q4) What is a hot site?
Q5) Why should redundant networks be implemented in many enterprise environments?
Q6) What are the steps in damage control?
Q7) What are the objectives of disaster exercises?
To view all questions and flashcards with answers, click on the resource link above. Page 16

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/45980
Sample Questions
Q1) What type of learner tends to sit in the middle of the class and learns best through lectures and discussions?
A)visual
B)auditory
C)kinesthetic
D)spatial
Q2) What is a security control?
Q3) Explain the concept of change management.
Q4) What is a risk register?
Q5) What kind of policy defines the actions users may perform while accessing systems and networking equipment?
A)VPN access policy
B)network use policy
C)privacy use policy
D)acceptable use policy
Q6) Which term below describes the art of helping an adult learn?
A)andragogical
B)pedagogical
C)deontological
D)metagogical
To view all questions and flashcards with answers, click on the resource link above. Page 17