Title | Network Security Midterm |
---|---|
Author | Shaina Aran |
Course | Netsec |
Institution | ACLC College |
Pages | 21 |
File Size | 490.8 KB |
File Type | |
Total Downloads | 31 |
Total Views | 165 |
Will help the students to have a better understanding about the concepts of network security among organizations to keep their network and important information safe from any individual who aim to gain unauthorized access to their system and will cause severe damage in an institution....
Netsec midterm Question 1 Correct Mark 1.00 out of 1.00
Flag question
Question text Is a service responsible for sending messages to other computers or users.
Select one: a. Server service b. Messenger service c. Print Spooler service d. Workstation service Feedback Your answer is correct. Question 2 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a core feature of Windows that allow the network administrator to enable and disable different features in Windows
Answer:
Group Policy
Question 3 Correct Mark 1.00 out of 1.00
Flag question
Question text Without this service on your environment, you won't be able to share any of your resources
Select one: a. Workstation service b. Messenger service c. Server service d. Print Spooler service Feedback Your answer is correct. Question 4 Correct Mark 1.00 out of 1.00
Flag question
Question text File system that has a features like permissions, encryption, quotas, and auditing services.
Answer: Question Correct
5
NTFS
Mark 1.00 out of 1.00
Flag question
Question text Which of the following are the commands for disabling a port in a Network Switch. Choose any that Apply
Select one or more: a. SWITCH>enable SWITCH#configure terminal SWITCH(config)#interface f0/2 SWITCH(config-if)#no shutdown b. SWITCH>enable SWITCH#config term SWITCH(config)#interface range f0/4-8 SWITCH(config-if-range)#shutdown c. SWITCH 1>enable SWITCH 1#configure terminal SWITCH 1(config)#interface f0/2 SWITCH 1(config-if)#shutdown d. SWITCH 1>enable SWITCH 1#configure terminal SWITCH 1(config)#interface f0/2 SWITCH 1(config-if)#no shutdown Feedback Your answer is correct. Question Correct
6
Mark 1.00 out of 1.00
Flag question
Question text It is a software service that manages the process of printing in the Windows environment.
Select one: a. Server service b. Messenger service c. Print Spooler service d. Workstation service Feedback Your answer is correct. Question 7 Correct Mark 1.00 out of 1.00
Flag question
Question text This service is the one responsible for handling connections to a remote network resources.
Select one: a. Print Spooler service b. Server service
c. Workstation service d. Messenger service Feedback Your answer is correct. Question 8 Correct Mark 1.00 out of 1.00
Flag question
Question text Two Categories of a Group Policy. Choose any that apply.
Select one or more: a. Security settings b. Computer settings c. Account settings d. User settings Feedback Your answer is correct. Question 9 Correct Mark 1.00 out of 1.00
Flag question
Question text
A popular feature of Windows that allows you to harden multiple systems quickly. Answer:
Security Templates
Question 10 Correct Mark 1.00 out of 1.00
Flag question
Question text is a crucial security update that you should always apply to your system
Select one: a. Service pack b. Security hot-fix c. Patch Feedback Your answer is correct. Question 11 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a standard configuration that is approved by any company for a specific type of system or device for being secure
Select one: a. Configuration Baseline
b. Security c. Security baseline d. File System Feedback Your answer is correct. Question 12 Correct Mark 1.00 out of 1.00
Flag question
Question text Which of the following are not part of the steps in order to harden your system. Choose only one.
Select one: a. Patch System b. Uninstall Necessary Software c. Disable Unnecessary Services d. Disable or Remove Unnecessary Accounts Feedback Your answer is correct. Question 13 Correct Mark 1.00 out of 1.00
Flag question
Question text Which of the following are the commands for disabling a port in a Network Switch. Choose any that Apply
Select one or more: a. SWITCH>enable SWITCH#config term SWITCH(config)#interface range f0/4-8 SWITCH(config-if-range)#shutdown b. SWITCH 1>enable SWITCH 1#configure terminal SWITCH 1(config)#interface f0/2 SWITCH 1(config-if)#shutdown c. SWITCH>enable SWITCH#configure terminal SWITCH(config)#interface f0/2 SWITCH(config-if)#no shutdown d. SWITCH 1>enable SWITCH 1#configure terminal SWITCH 1(config)#interface f0/2 SWITCH 1(config-if)#no shutdown Feedback Your answer is correct. Question 14 Correct Mark 1.00 out of 1.00
Flag question
Question text It ensure that the essential and vital services are only running on the system
Answer:
Services running
Question 15 Correct Mark 1.00 out of 1.00
Flag question
Question text NTFS and FAT/FAT32 is an example of?
Answer:
File System
Question 1 Complete Mark 1.00 out of 1.00
Flag question
Question text To avoid and prevent this type of attack, users should always choose the “Remember Me” option when logging in to any web site.
Select one: True False Question 2 Complete
Mark 1.00 out of 1.00
Flag question
Question text Always disable unnecessary features of the web server that are not going to be used
Select one: True False Question 3 Complete Mark 1.00 out of 1.00
Flag question
Question text It is a special system used in industrial environments and settings to monitor their operations
Select one: a. Embedded b. Mainframe c. SCADA d. Android Question 4 Complete Mark 1.00 out of 1.00
Flag question
Question text It is a security concern because most scripting languages can make some alteration to your system.
Select one: a. Scripting b. Java c. Cookies d. Cross-site scripting Question 5 Complete Mark 1.00 out of 1.00
Flag question
Question text It is an advanced method of handling an error.
Answer:
Exception handling
Question 6 Complete Mark 1.00 out of 1.00
Flag question
Question text It is another term for a runtime error
Answer:
Exception
Question 7 Complete Mark 1.00 out of 1.00
Flag question
Question text The following codes is an example of?
Try MessageBox.Show(cdbl(txtTotalValue.text) + cdbl(txtTotalVAT.text)) Catch ex as InvalidCastException MessageBox.Show("Please supply 2 numbers as input") Catch ex as Exception MessageBox.Show("An error has occurred. Please try again.") End Try Select one: a. Exception handling b. try/catch block c. handling errors d. block syntax Question 8 Complete Mark 1.00 out of 1.00
Flag question
Question text These are logon information from all the websites you visit and is stored in memory on computer
Answer:
Cookies
Question 9 Complete Mark 1.00 out of 1.00
Flag question
Question text Developers should always implement validation at both the client and the server to obtain high level of security.
Select one: True False Question 10 Complete Mark 1.00 out of 1.00
Flag question
Question text SMTP and FTP are used to transfer information over a computer network.
Select one: True False
Question 11 Complete Mark 1.00 out of 1.00
Flag question
Question text It is a restricted area with a resource that these Java applications can access.
Select one: a. ActiveX controls b. Sandbox c. Scripting d. Java Question 12 Complete Mark 1.00 out of 1.00
Flag question
Question text Large volume of data is also known as
Answer:
Big Data
Question 13 Complete Mark 1.00 out of 1.00
Flag question
Question text very single application must go through the options and check whether each application is configured in the most secure state.
Select one: True False Question 14 Complete Mark 1.00 out of 1.00
Flag question
Question text It can manipulate your system including the deletion of the important files on your computer.
Answer:
ActiveX Controls
Question 15 Complete Mark 1.00 out of 1.00
Flag question
Question text It is the idea of developing a database system to store and retrieve large volumes of data
Answer: Question
1
NoSQL database
Correct Mark 1.00 out of 1.00
Flag question
Question text Software that makes each network devices works and do its job is called?
Answer:
Firmw are
Question 2 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a core feature of Windows that permits the network administrator to enable and disable different features in Windows
Answer:
Group Policy
Question 3 Correct Mark 1.00 out of 1.00
Flag question
Question text It is an advanced method of error handling.
Select one: a. Error message b. Exception handling
c. Run-time error Feedback Your answer is correct. Question 4 Correct Mark 1.00 out of 1.00
Flag question
Question text It means that the developer checks all the data to make sure that the information provided by the user in the application is valid and correct.
Select one: a. Input Validation b. try/catch block c. Exception Handling Feedback Your answer is correct. Question 5 Correct Mark 1.00 out of 1.00
Flag question
Question text Another term for Port security.
Answer: Question
6
MAC limiting
Correct Mark 1.00 out of 1.00
Flag question
Question text It is a type of reporting method that is used to report critical events that typically require some form of actions from the system or network administrator.
Answer:
Alarms
Question 7 Correct Mark 1.00 out of 1.00
Flag question
Question text Software vendors used to find out about the vulnerabilities of their system after receiving some reports from their users.
Select one: True False Question 8 Correct Mark 1.00 out of 1.00
Flag question
Question text It can limit which devices can connect to a specific port on the switch by listing specific MAC addresses with the port.
Answer:
Port Security
Question 9 Correct Mark 1.00 out of 1.00
Flag question
Question text You can configure user rights on the system, auditing, and other security settings such as creating a logon banner
Select one or more: a. Account Policies b. Local Policies c. User Settings Feedback Your answer is correct. Question 10 Correct Mark 1.00 out of 1.00
Flag question
Question text it is a type of reports that is only used to notify the system administrator that there’s a change occurred in the system.
Answer:
Alerts
Question 11 Correct Mark 1.00 out of 1.00
Flag question
Question text Networking device that sends the packets to every one of its ports to ensure that it will reach its intended destination.
Answer:
hubs
Question 12 Correct Mark 1.00 out of 1.00
Flag question
Question text Networking device that has a filtering feature where it sends the traffic only to the port of the destination device.
Answer:
netw ork sw itch
Question 13 Correct Mark 1.00 out of 1.00
Flag question
Question text Which of these are not part of the two categories of Group Policy. (Choose any that applies)
Select one or more: a. Security settings b.
Computer settings c. User settings d. Window settings Feedback Your answer is correct....