Security
Chapter Questions (take home assignment – due at final or during finals week)
True/False
Indicate
whether the sentence or statement is true or false.
____ 1. Every organization should assess its
security risks by conducting a security audit.
____ 2. For each possible security threat, you
should rate the severity of its potential consequences, as well as its
likelihood.
____ 3. Network security is more often compromised
from external sources than "from the inside".
____ 4. A denial-of-service attack occurs before a
cracker has gained access to your system through the Internet.
____ 5. If users complain about password
requirements, you may allow them not to use passwords as long as the users
understand the risks.
____ 6. Packet-filtering firewalls require little
to no custom configuration to be effective.
____ 7. Public key encryption is also known as
asymmetric encryption.
____ 8. VPNs are private networks that use public
channels to connect clients and servers.
Modified
True/False
Indicate
whether the sentence or statement is true or false. If false, change the identified word or phrase to make the
sentence or statement true.
____ 9. A(n) filter is a specialized device
(usually a router, but possibly only a PC running special software) that selectively
filters or blocks traffic between networks. _________________________
____ 10. Network operating system software
typically contains "trapdoors" or security flaws.
_________________________
____ 11. An incorrectly configured firewall may
allow outsiders to obtain internal IP addresses and then use those addresses to
pretend that they have authority to access your internal network from the
Internet. This process is called IP
cloning. _________________________
____ 12. One method that many large organizations
use to provide physical security is to require authorized employees to wear
access badges, which can be programmed to allow their owner the correct
accesses. _________________________
____ 13. The simplest and most common form of a
firewall is a(n) data-filtering firewall. _________________________
____ 14. The most popular private key
encryption is the data encryption standard (DES), which was developed by IBM in
the 1970s. _________________________
Multiple
Choice
Identify
the letter of the choice that best completes the statement or answers the
question.
____ 15. In general, ____ refers to a highly
privileged user ID that has all rights to create, delete, modify, move, read,
write, or execute files on a system.
a. |
administrator |
c. |
super |
b. |
superuser |
d. |
root |
____ 16. A ____ uses his knowledge of operating
systems and utilities to intentionally damage or destroy data or systems.
a. |
cracker |
c. |
hacker |
b. |
debugger |
d. |
host |
____ 17. ____ is the process of verifying a user's
validity and authority on a system.
a. |
Authentication |
c. |
Verification |
b. |
Validation |
d. |
Error checking |
____ 18. Preferably, an organization should assess
its security risks ____.
a. |
monthly |
c. |
annually |
b. |
quarterly |
d. |
biannually |
____ 19. By some estimates, human errors,
ignorance, or omissions cause more than ____ percent of security breaches
sustained by networks.
a. |
10 |
c. |
50 |
b. |
25 |
d. |
75 |
____ 20. Risks associated with hardware and network
design are inherent in (roughly) which OSI Layers?
a. |
Physical and Application |
c. |
Presentation and Session |
b. |
Transport and Data Link |
d. |
Physical and Data Link |
____ 21. Which cannot be intercepted?
a. |
wireless transmissions |
c. |
spread-spectrum wireless transmissions |
b. |
wire-based transmissions |
d. |
None of the above. |
____ 22. Network hubs broadcast traffic over the
entire segment, thus making transmissions more widely vulnerable to ____.
a. |
eavesdropping |
c. |
interception |
b. |
sniffing |
d. |
backdooring |
____ 23. Which is the least risky when selecting
your network hardware and design?
a. |
Having unused server ports that are
enabled. |
b. |
Having remote users access dial-in
servers. |
c. |
Computers hosting sensitive data
coexisting on the same subnet with computers open to the general public. |
d. |
Using switches. |
____ 24. Which is true about a denial-of-service
attack?
a. |
It is relatively complex to launch. |
b. |
The easiest resolution is to turn off
the affected server. |
c. |
It may result from malfunctioning
software. |
d. |
None of the above. |
____ 25. The first step in securing your network is
to implement ____.
a. |
hardware security measures |
c. |
a security policy |
b. |
software security measures |
d. |
operating system security measures |
____ 26. Which is not true about a security policy?
a. |
It may include content that does not
pertain to computers or networks. |
b. |
It specifies which software will be used
to ensure security. |
c. |
It prevents intentional damage to
hardware or software. |
d. |
None of the above. |
____ 27. Which is not true about a security
response team?
a. |
Each member should be assigned a role
and responsibilities related to the security policy. |
b. |
It should regularly rehearse its defense
in a security threat drill. |
c. |
It should be composed of members of the
network group with highly technical skills. |
d. |
The leader of the team is often called a
security coordinator. |
____ 28. Which is true about passwords?
a. |
The shorter the better. |
b. |
Use something that is easy to remember,
such as your pet's or child's name. |
c. |
Even if allowed, do not use special
characters, such as exclamation marks, because they are easy to mistype. |
d. |
Do not write them down, even if it is in
safe place. |
____ 29. It is recommended to change a password at
least every ____.
a. |
day |
c. |
30 days |
b. |
week |
d. |
90 days |
____ 30. Which areas should be physically secured?
a. |
computer rooms |
b. |
wiring closet with hubs or switches |
c. |
telecommunications closet with leased
line to the Internet |
d. |
All of the above. |
____ 31. Using color patterns in an eye's iris or
whorls in a fingerprint to establish identity are examples of ____.
a. |
scanning access |
c. |
bio-recognition access |
b. |
physical characteristic access |
d. |
electronic access |
____ 32. Which is the most expensive type of
security?
a. |
electronic badge system |
b. |
bio-recognition device |
c. |
locks that have numeric codes which must
be punched |
d. |
key lock |