Network Administration and Security Test Questions - 588 Verified Questions

Page 1


Network Administration and Security Test Questions

Course Introduction

Network Administration and Security explores the principles and practices involved in managing, configuring, and securing computer networks. The course covers essential topics such as network topologies, protocols, hardware components, user and device management, and troubleshooting. It introduces students to the fundamentals of network security, including threat assessment, firewall configuration, intrusion detection, virtual private networks (VPN), access controls, and encryption techniques. Through practical labs and real-world scenarios, students develop hands-on skills in deploying secure networks, implementing security policies, and responding to network vulnerabilities and attacks, preparing them for careers in IT administration and cybersecurity.

Recommended Textbook

Security+ Guide to Network Security Fundamentals 4th Edition by Mark Ciampa

Available Study Resources on Quizplus 14 Chapters

588 Verified Questions

588 Flashcards

Source URL: https://quizplus.com/study-set/1054 Page 2

Chapter 1: Introduction to Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20875

Sample Questions

Q1) ____ involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.

A) Cyberterrorism

B) Identity theft

C) Phishing

D) Scam

Answer: B

Q2) The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

A) network security

B) information security

C) physical security

D) logical security

Answer: B

Q3) The demand for IT professionals who know how to secure networks and computers is at an all-time low.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Malware and Social Engineering Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20876

Sample Questions

Q1) There are almost ____ different Microsoft Windows file extensions that could contain a virus.

A) 50

B) 60

C) 70

D) 80

Answer: C

Q2) How does a rootkit work?

Answer: One approach used by rootkits is to alter or replace operating system files with modified versions that are specifically designed to ignore malicious activity. For example, on a computer the anti-malware software may be instructed to scan all files in a specific directory and in order to do this, the software will receive a list of those files from the operating system. A rootkit will replace the operating system's ability to retrieve a list of files with its own modified version that ignores specific malicious files. The anti-malware software assumes that the computer will willingly carry out those instructions and retrieve all files; it does not know that the computer is only displaying files that the rootkit has approved.

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Application and Network Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20877

Sample Questions

Q1) What does a user need to perform a directory traversal attack?

Answer: To perform a directory traversal attack, an attacker, needs only a Web browser and knowledge of the location of default files and directories on the system under attack.

Q2) Because of the minor role it plays, DNS is never the focus of attacks.

A)True

B)False

Answer: False

Q3) ____ is an attack in which an attacker attempts to impersonate the user by using his session token.

A) Session replay

B) Session spoofing

C) Session hijacking

D) Session blocking

Answer: C

Q4) A(n) ____________________ is a method for adding annotations to the text so that the additions can be distinguished from the text itself.

Answer: markup language

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Vulnerability Assessment and Mitigating Attacks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20878

Sample Questions

Q1) A ____ tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications.

A) white box

B) black box

C) replay

D) system

Q2) Describe a penetration testing report.

Q3) Most vulnerability scanners maintain a(n) ____________________ that categorizes and describes the vulnerabilities that it can detect.

Q4) A security weakness is known as a(n) ____.

A) threat

B) vulnerability

C) risk

D) opportunity

Q5) List two types of hardening techniques.

Q6) List and describe the three categories that TCP/IP divides port numbers into.

Q7) Discuss one type of asset that an organization might have.

Page 6

Q8) List and describe the elements that make up a security posture.

Q9) Describe the purpose of a honeypot.

To view all questions and flashcards with answers, click on the resource link above.

Page 7

Chapter 5: Host, Application, and Data Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20879

Sample Questions

Q1) Securing a restricted area by erecting a barrier is called ____.

A) blocking

B) boundary placement

C) fencing

D) moating

Q2) A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.

A) IPS

B) scanner

C) firewall

D) honeypot

Q3) Keyed entry locks are much more difficult to defeat than deadbolt locks.

A)True

B)False

Q4) ____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.

Q5) Describe RFID tags.

Q6) ____________________ security involves restricting access to the areas in which equipment is located.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 6: Network Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20880

Sample Questions

Q1) A ____ allows scattered users to be logically grouped together even though they may be attached to different switches.

A) subnet

B) broadcast domain

C) DMZ

D) VLAN

Q2) ____ is a technology that can help to evenly distribute work across a network.

A) Stateful packet filtering

B) Load balancing

C) DNS caching

D) DNS poisoning

Q3) The OSI model breaks networking steps down into a series of six layers.

A)True

B)False

Q4) Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.

Q5) Workgroup switches must work faster than core switches.

A)True

B)False

Q6) Describe all-in-one network security appliances.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Administering a Secure Network

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20881

Sample Questions

Q1) The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.

A) UDP

B) ASN.1

C) TCP/IP

D) BER

Q2) ____ is used to relay query messages.

A) ICMP

B) FTP

C) UDP

D) TCP

Q3) ____ provides a greater degree of security by implementing port-based authentication.

A) IEEE 802.3ad

B) IEEE 802.11n

C) IEEE 802.1x

D) IEEE 802.1z

Q4) Why is the Physical Layer omitted in the TCP/IP model?

Q5) List the steps of a DNS lookup.

Q6) List and describe the three service models of cloud computing.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Wireless Network Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20882

Sample Questions

Q1) Explain why it is important to be able to control the power level at which the WLAN transmits.

Q2) ____ allow a single access point to service different types of users.

A) Wireless VPNs

B) Wireless encryption standards

C) Wireless multimedia protocols

D) Wireless VLANs

Q3) A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.

A) random

B) sanctioned

C) rogue

D) legitimate

Q4) ____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.

Q5) Bluetooth devices are not backward compatible with previous versions.

A)True

B)False

Q6) Discuss how to prevent bluesnarfing.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Access Control Fundamentals

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20883

Sample Questions

Q1) ____________________ is granting or denying approval to use specific resources.

Q2) During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.

A) accounting request

B) access request

C) verification request

D) authentication request

Q3) A user under Role Based Access Control can be assigned only one ____.

A) role

B) group

C) label

D) access list

Q4) A user accessing a computer system must present credentials or ____ when logging on to the system.

A) access

B) authorize

C) token

D) identification

Q5) List two major access control models.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Authentication and Account Management

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20884

Sample Questions

Q1) ____ holds the promise of reducing the number of usernames and passwords that users must memorize.

A) ISO

B) SSO

C) SSL

D) IAM

Q2) What are the three advantages of a rainbow table over other password attacks?

Q3) The weakness of passwords centers on ____.

A) human memory

B) encryption technology

C) handshake technology

D) human reliability

Q4) Trusted OSs have been used since the late 1960s, initially for government and military applications.

A)True

B)False

Q5) Why do passwords place a heavy load on human memory?

Q6) Discuss the focus of the OS vendors developing trusted OSs.

Q7) Describe how rainbow tables work.

Q8) Identify two basic flows that operating systems can have.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Basic Cryptography

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20885

Sample Questions

Q1) Describe the origins of cryptography.

Q2) The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.

A) TPM

B) SCM

C) reference monitor

D) ODS

Q3) Describe how a block cipher works.

Q4) The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.

A) AES

B) 3DES

C) RSA

D) Twofish

Q5) Steganography can use image files, audio files, or even video files to contain hidden information.

A)True

B)False

Q6) Discuss how HMAC works.

Q7) Discuss how cryptography can help ensure the availability of the data.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Advanced Cryptography

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20886

Sample Questions

Q1) ____ certificates enable clients connecting to the Web server to examine the identity of the server's owner.

A) Personal digital

B) Public digital

C) Private digital

D) Server digital

Q2) List two requirements for verification of an EV SSL.

Q3) ____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.

A) Blocking

B) Hashing

C) Encrypting

D) Cloning

Q4) The ____ model is the basis for digital certificates issued to Internet users.

A) third-party trust

B) related trust

C) managed trust

D) distributed trust

Q5) Identify the general duties of an RA.

Q6) Discuss the three areas of protection that are provided by IPsec.

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Business Continuity

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20887

Sample Questions

Q1) The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.

A) chain of value

B) chain of use

C) chain of property

D) chain of custody

Q2) Most metadata about a file is generated and recorded automatically without the user's knowledge.

A)True

B)False

Q3) A ____ is a snapshot of the current state of the computer that contains all current settings and data.

A) system standard

B) system view

C) system image

D) system baseline

Q4) ____________________ is data about data.

Q5) What are the steps in damage control?

Q6) Discuss the purpose and importance of the chain of custody.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 14: Risk Mitigation

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20888

Sample Questions

Q1) ____ learners tend to sit in the middle of the class and learn best through lectures and discussions.

A) Visual

B) Auditory

C) Kinesthetic

D) Spatial

Q2) The objective of incident response is to restore normal operations as quickly as possible with the least possible impact on either the business or the users.

A)True

B)False

Q3) A(n) ____________________ is a collection of requirements specific to the system or procedure that must be met by everyone.

Q4) Which roles should be represented on the security policy development team?

Q5) List four attributes that should be compiled for new equipment in the change management documentation.

Q6) What is a general security tip for using a social networking site?

Q7) List two characteristics of a policy.

Q8) What are the typical classification designations of government documents?

To view all questions and flashcards with answers, click on the resource link above. Page 17

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.