

![]()


Network Administration and Security explores the principles and practices involved in managing, configuring, and securing computer networks. The course covers essential topics such as network topologies, protocols, hardware components, user and device management, and troubleshooting. It introduces students to the fundamentals of network security, including threat assessment, firewall configuration, intrusion detection, virtual private networks (VPN), access controls, and encryption techniques. Through practical labs and real-world scenarios, students develop hands-on skills in deploying secure networks, implementing security policies, and responding to network vulnerabilities and attacks, preparing them for careers in IT administration and cybersecurity.
Recommended Textbook
Security+ Guide to Network Security Fundamentals 4th Edition by Mark Ciampa
Available Study Resources on Quizplus 14 Chapters
588 Verified Questions
588 Flashcards
Source URL: https://quizplus.com/study-set/1054 Page 2

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20875
Sample Questions
Q1) ____ involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.
A) Cyberterrorism
B) Identity theft
C) Phishing
D) Scam
Answer: B
Q2) The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
A) network security
B) information security
C) physical security
D) logical security
Answer: B
Q3) The demand for IT professionals who know how to secure networks and computers is at an all-time low.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 3
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20876
Sample Questions
Q1) There are almost ____ different Microsoft Windows file extensions that could contain a virus.
A) 50
B) 60
C) 70
D) 80
Answer: C
Q2) How does a rootkit work?
Answer: One approach used by rootkits is to alter or replace operating system files with modified versions that are specifically designed to ignore malicious activity. For example, on a computer the anti-malware software may be instructed to scan all files in a specific directory and in order to do this, the software will receive a list of those files from the operating system. A rootkit will replace the operating system's ability to retrieve a list of files with its own modified version that ignores specific malicious files. The anti-malware software assumes that the computer will willingly carry out those instructions and retrieve all files; it does not know that the computer is only displaying files that the rootkit has approved.
To view all questions and flashcards with answers, click on the resource link above.

4

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20877
Sample Questions
Q1) What does a user need to perform a directory traversal attack?
Answer: To perform a directory traversal attack, an attacker, needs only a Web browser and knowledge of the location of default files and directories on the system under attack.
Q2) Because of the minor role it plays, DNS is never the focus of attacks.
A)True
B)False
Answer: False
Q3) ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
A) Session replay
B) Session spoofing
C) Session hijacking
D) Session blocking
Answer: C
Q4) A(n) ____________________ is a method for adding annotations to the text so that the additions can be distinguished from the text itself.
Answer: markup language
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20878
Sample Questions
Q1) A ____ tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications.
A) white box
B) black box
C) replay
D) system
Q2) Describe a penetration testing report.
Q3) Most vulnerability scanners maintain a(n) ____________________ that categorizes and describes the vulnerabilities that it can detect.
Q4) A security weakness is known as a(n) ____.
A) threat
B) vulnerability
C) risk
D) opportunity
Q5) List two types of hardening techniques.
Q6) List and describe the three categories that TCP/IP divides port numbers into.
Q7) Discuss one type of asset that an organization might have.
Page 6
Q8) List and describe the elements that make up a security posture.
Q9) Describe the purpose of a honeypot.
To view all questions and flashcards with answers, click on the resource link above.
Page 7

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20879
Sample Questions
Q1) Securing a restricted area by erecting a barrier is called ____.
A) blocking
B) boundary placement
C) fencing
D) moating
Q2) A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
A) IPS
B) scanner
C) firewall
D) honeypot
Q3) Keyed entry locks are much more difficult to defeat than deadbolt locks.
A)True
B)False
Q4) ____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
Q5) Describe RFID tags.
Q6) ____________________ security involves restricting access to the areas in which equipment is located.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20880
Sample Questions
Q1) A ____ allows scattered users to be logically grouped together even though they may be attached to different switches.
A) subnet
B) broadcast domain
C) DMZ
D) VLAN
Q2) ____ is a technology that can help to evenly distribute work across a network.
A) Stateful packet filtering
B) Load balancing
C) DNS caching
D) DNS poisoning
Q3) The OSI model breaks networking steps down into a series of six layers.
A)True
B)False
Q4) Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.
Q5) Workgroup switches must work faster than core switches.
A)True
B)False
Q6) Describe all-in-one network security appliances.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20881
Sample Questions
Q1) The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
A) UDP
B) ASN.1
C) TCP/IP
D) BER
Q2) ____ is used to relay query messages.
A) ICMP
B) FTP
C) UDP
D) TCP
Q3) ____ provides a greater degree of security by implementing port-based authentication.
A) IEEE 802.3ad
B) IEEE 802.11n
C) IEEE 802.1x
D) IEEE 802.1z
Q4) Why is the Physical Layer omitted in the TCP/IP model?
Q5) List the steps of a DNS lookup.
Q6) List and describe the three service models of cloud computing.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20882
Sample Questions
Q1) Explain why it is important to be able to control the power level at which the WLAN transmits.
Q2) ____ allow a single access point to service different types of users.
A) Wireless VPNs
B) Wireless encryption standards
C) Wireless multimedia protocols
D) Wireless VLANs
Q3) A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
A) random
B) sanctioned
C) rogue
D) legitimate
Q4) ____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
Q5) Bluetooth devices are not backward compatible with previous versions.
A)True
B)False
Q6) Discuss how to prevent bluesnarfing.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20883
Sample Questions
Q1) ____________________ is granting or denying approval to use specific resources.
Q2) During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.
A) accounting request
B) access request
C) verification request
D) authentication request
Q3) A user under Role Based Access Control can be assigned only one ____.
A) role
B) group
C) label
D) access list
Q4) A user accessing a computer system must present credentials or ____ when logging on to the system.
A) access
B) authorize
C) token
D) identification
Q5) List two major access control models.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20884
Sample Questions
Q1) ____ holds the promise of reducing the number of usernames and passwords that users must memorize.
A) ISO
B) SSO
C) SSL
D) IAM
Q2) What are the three advantages of a rainbow table over other password attacks?
Q3) The weakness of passwords centers on ____.
A) human memory
B) encryption technology
C) handshake technology
D) human reliability
Q4) Trusted OSs have been used since the late 1960s, initially for government and military applications.
A)True
B)False
Q5) Why do passwords place a heavy load on human memory?
Q6) Discuss the focus of the OS vendors developing trusted OSs.
Q7) Describe how rainbow tables work.
Q8) Identify two basic flows that operating systems can have.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20885
Sample Questions
Q1) Describe the origins of cryptography.
Q2) The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.
A) TPM
B) SCM
C) reference monitor
D) ODS
Q3) Describe how a block cipher works.
Q4) The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.
A) AES
B) 3DES
C) RSA
D) Twofish
Q5) Steganography can use image files, audio files, or even video files to contain hidden information.
A)True
B)False
Q6) Discuss how HMAC works.
Q7) Discuss how cryptography can help ensure the availability of the data.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20886
Sample Questions
Q1) ____ certificates enable clients connecting to the Web server to examine the identity of the server's owner.
A) Personal digital
B) Public digital
C) Private digital
D) Server digital
Q2) List two requirements for verification of an EV SSL.
Q3) ____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.
A) Blocking
B) Hashing
C) Encrypting
D) Cloning
Q4) The ____ model is the basis for digital certificates issued to Internet users.
A) third-party trust
B) related trust
C) managed trust
D) distributed trust
Q5) Identify the general duties of an RA.
Q6) Discuss the three areas of protection that are provided by IPsec.
Page 15
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20887
Sample Questions
Q1) The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.
A) chain of value
B) chain of use
C) chain of property
D) chain of custody
Q2) Most metadata about a file is generated and recorded automatically without the user's knowledge.
A)True
B)False
Q3) A ____ is a snapshot of the current state of the computer that contains all current settings and data.
A) system standard
B) system view
C) system image
D) system baseline
Q4) ____________________ is data about data.
Q5) What are the steps in damage control?
Q6) Discuss the purpose and importance of the chain of custody.
To view all questions and flashcards with answers, click on the resource link above. Page 16

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20888
Sample Questions
Q1) ____ learners tend to sit in the middle of the class and learn best through lectures and discussions.
A) Visual
B) Auditory
C) Kinesthetic
D) Spatial
Q2) The objective of incident response is to restore normal operations as quickly as possible with the least possible impact on either the business or the users.
A)True
B)False
Q3) A(n) ____________________ is a collection of requirements specific to the system or procedure that must be met by everyone.
Q4) Which roles should be represented on the security policy development team?
Q5) List four attributes that should be compiled for new equipment in the change management documentation.
Q6) What is a general security tip for using a social networking site?
Q7) List two characteristics of a policy.
Q8) What are the typical classification designations of government documents?
To view all questions and flashcards with answers, click on the resource link above. Page 17