Network Security Midterm PDF

Title Network Security Midterm
Author Shaina Aran
Course Netsec
Institution ACLC College
Pages 21
File Size 490.8 KB
File Type PDF
Total Downloads 31
Total Views 165

Summary

Will help the students to have a better understanding about the concepts of network security among organizations to keep their network and important information safe from any individual who aim to gain unauthorized access to their system and will cause severe damage in an institution....


Description

Netsec midterm Question 1 Correct Mark 1.00 out of 1.00

Flag question

Question text Is a service responsible for sending messages to other computers or users.

Select one: a. Server service b. Messenger service c. Print Spooler service d. Workstation service Feedback Your answer is correct. Question 2 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a core feature of Windows that allow the network administrator to enable and disable different features in Windows

Answer:

Group Policy

Question 3 Correct Mark 1.00 out of 1.00

Flag question

Question text Without this service on your environment, you won't be able to share any of your resources

Select one: a. Workstation service b. Messenger service c. Server service d. Print Spooler service Feedback Your answer is correct. Question 4 Correct Mark 1.00 out of 1.00

Flag question

Question text File system that has a features like permissions, encryption, quotas, and auditing services.

Answer: Question Correct

5

NTFS

Mark 1.00 out of 1.00

Flag question

Question text Which of the following are the commands for disabling a port in a Network Switch. Choose any that Apply

Select one or more: a. SWITCH>enable SWITCH#configure terminal SWITCH(config)#interface f0/2 SWITCH(config-if)#no shutdown b. SWITCH>enable SWITCH#config term SWITCH(config)#interface range f0/4-8 SWITCH(config-if-range)#shutdown c. SWITCH 1>enable SWITCH 1#configure terminal SWITCH 1(config)#interface f0/2 SWITCH 1(config-if)#shutdown d. SWITCH 1>enable SWITCH 1#configure terminal SWITCH 1(config)#interface f0/2 SWITCH 1(config-if)#no shutdown Feedback Your answer is correct. Question Correct

6

Mark 1.00 out of 1.00

Flag question

Question text It is a software service that manages the process of printing in the Windows environment.

Select one: a. Server service b. Messenger service c. Print Spooler service d. Workstation service Feedback Your answer is correct. Question 7 Correct Mark 1.00 out of 1.00

Flag question

Question text This service is the one responsible for handling connections to a remote network resources.

Select one: a. Print Spooler service b. Server service

c. Workstation service d. Messenger service Feedback Your answer is correct. Question 8 Correct Mark 1.00 out of 1.00

Flag question

Question text Two Categories of a Group Policy. Choose any that apply.

Select one or more: a. Security settings b. Computer settings c. Account settings d. User settings Feedback Your answer is correct. Question 9 Correct Mark 1.00 out of 1.00

Flag question

Question text

A popular feature of Windows that allows you to harden multiple systems quickly. Answer:

Security Templates

Question 10 Correct Mark 1.00 out of 1.00

Flag question

Question text is a crucial security update that you should always apply to your system

Select one: a. Service pack b. Security hot-fix c. Patch Feedback Your answer is correct. Question 11 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a standard configuration that is approved by any company for a specific type of system or device for being secure

Select one: a. Configuration Baseline

b. Security c. Security baseline d. File System Feedback Your answer is correct. Question 12 Correct Mark 1.00 out of 1.00

Flag question

Question text Which of the following are not part of the steps in order to harden your system. Choose only one.

Select one: a. Patch System b. Uninstall Necessary Software c. Disable Unnecessary Services d. Disable or Remove Unnecessary Accounts Feedback Your answer is correct. Question 13 Correct Mark 1.00 out of 1.00

Flag question

Question text Which of the following are the commands for disabling a port in a Network Switch. Choose any that Apply

Select one or more: a. SWITCH>enable SWITCH#config term SWITCH(config)#interface range f0/4-8 SWITCH(config-if-range)#shutdown b. SWITCH 1>enable SWITCH 1#configure terminal SWITCH 1(config)#interface f0/2 SWITCH 1(config-if)#shutdown c. SWITCH>enable SWITCH#configure terminal SWITCH(config)#interface f0/2 SWITCH(config-if)#no shutdown d. SWITCH 1>enable SWITCH 1#configure terminal SWITCH 1(config)#interface f0/2 SWITCH 1(config-if)#no shutdown Feedback Your answer is correct. Question 14 Correct Mark 1.00 out of 1.00

Flag question

Question text It ensure that the essential and vital services are only running on the system

Answer:

Services running

Question 15 Correct Mark 1.00 out of 1.00

Flag question

Question text NTFS and FAT/FAT32 is an example of?

Answer:

File System

Question 1 Complete Mark 1.00 out of 1.00

Flag question

Question text To avoid and prevent this type of attack, users should always choose the “Remember Me” option when logging in to any web site.

Select one: True False Question 2 Complete

Mark 1.00 out of 1.00

Flag question

Question text Always disable unnecessary features of the web server that are not going to be used

Select one: True False Question 3 Complete Mark 1.00 out of 1.00

Flag question

Question text It is a special system used in industrial environments and settings to monitor their operations

Select one: a. Embedded b. Mainframe c. SCADA d. Android Question 4 Complete Mark 1.00 out of 1.00

Flag question

Question text It is a security concern because most scripting languages can make some alteration to your system.

Select one: a. Scripting b. Java c. Cookies d. Cross-site scripting Question 5 Complete Mark 1.00 out of 1.00

Flag question

Question text It is an advanced method of handling an error.

Answer:

Exception handling

Question 6 Complete Mark 1.00 out of 1.00

Flag question

Question text It is another term for a runtime error

Answer:

Exception

Question 7 Complete Mark 1.00 out of 1.00

Flag question

Question text The following codes is an example of?

Try MessageBox.Show(cdbl(txtTotalValue.text) + cdbl(txtTotalVAT.text)) Catch ex as InvalidCastException MessageBox.Show("Please supply 2 numbers as input") Catch ex as Exception MessageBox.Show("An error has occurred. Please try again.") End Try Select one: a. Exception handling b. try/catch block c. handling errors d. block syntax Question 8 Complete Mark 1.00 out of 1.00

Flag question

Question text These are logon information from all the websites you visit and is stored in memory on computer

Answer:

Cookies

Question 9 Complete Mark 1.00 out of 1.00

Flag question

Question text Developers should always implement validation at both the client and the server to obtain high level of security.

Select one: True False Question 10 Complete Mark 1.00 out of 1.00

Flag question

Question text SMTP and FTP are used to transfer information over a computer network.

Select one: True False

Question 11 Complete Mark 1.00 out of 1.00

Flag question

Question text It is a restricted area with a resource that these Java applications can access.

Select one: a. ActiveX controls b. Sandbox c. Scripting d. Java Question 12 Complete Mark 1.00 out of 1.00

Flag question

Question text Large volume of data is also known as

Answer:

Big Data

Question 13 Complete Mark 1.00 out of 1.00

Flag question

Question text very single application must go through the options and check whether each application is configured in the most secure state.

Select one: True False Question 14 Complete Mark 1.00 out of 1.00

Flag question

Question text It can manipulate your system including the deletion of the important files on your computer.

Answer:

ActiveX Controls

Question 15 Complete Mark 1.00 out of 1.00

Flag question

Question text It is the idea of developing a database system to store and retrieve large volumes of data

Answer: Question

1

NoSQL database

Correct Mark 1.00 out of 1.00

Flag question

Question text Software that makes each network devices works and do its job is called?

Answer:

Firmw are

Question 2 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a core feature of Windows that permits the network administrator to enable and disable different features in Windows

Answer:

Group Policy

Question 3 Correct Mark 1.00 out of 1.00

Flag question

Question text It is an advanced method of error handling.

Select one: a. Error message b. Exception handling

c. Run-time error Feedback Your answer is correct. Question 4 Correct Mark 1.00 out of 1.00

Flag question

Question text It means that the developer checks all the data to make sure that the information provided by the user in the application is valid and correct.

Select one: a. Input Validation b. try/catch block c. Exception Handling Feedback Your answer is correct. Question 5 Correct Mark 1.00 out of 1.00

Flag question

Question text Another term for Port security.

Answer: Question

6

MAC limiting

Correct Mark 1.00 out of 1.00

Flag question

Question text It is a type of reporting method that is used to report critical events that typically require some form of actions from the system or network administrator.

Answer:

Alarms

Question 7 Correct Mark 1.00 out of 1.00

Flag question

Question text Software vendors used to find out about the vulnerabilities of their system after receiving some reports from their users.

Select one: True False Question 8 Correct Mark 1.00 out of 1.00

Flag question

Question text It can limit which devices can connect to a specific port on the switch by listing specific MAC addresses with the port.

Answer:

Port Security

Question 9 Correct Mark 1.00 out of 1.00

Flag question

Question text You can configure user rights on the system, auditing, and other security settings such as creating a logon banner

Select one or more: a. Account Policies b. Local Policies c. User Settings Feedback Your answer is correct. Question 10 Correct Mark 1.00 out of 1.00

Flag question

Question text it is a type of reports that is only used to notify the system administrator that there’s a change occurred in the system.

Answer:

Alerts

Question 11 Correct Mark 1.00 out of 1.00

Flag question

Question text Networking device that sends the packets to every one of its ports to ensure that it will reach its intended destination.

Answer:

hubs

Question 12 Correct Mark 1.00 out of 1.00

Flag question

Question text Networking device that has a filtering feature where it sends the traffic only to the port of the destination device.

Answer:

netw ork sw itch

Question 13 Correct Mark 1.00 out of 1.00

Flag question

Question text Which of these are not part of the two categories of Group Policy. (Choose any that applies)

Select one or more: a. Security settings b.

Computer settings c. User settings d. Window settings Feedback Your answer is correct....


Similar Free PDFs