Chapter 5
A1: | f |
A2: | e |
A3: | d |
A4: | b |
A5: | a |
A6: | a |
A7: | b,d |
A8: | e |
A9: | e |
A10: | a |
A11: | a,b,c,d |
Q&A
1: | What are the three elements of a good security policy? |
A1: | The three elements of a good security policy are that the policy must be capable of being implemented; must clearly define the areas of responsibility and the roles of users, administrators, and managers; and must be enforceable and applicable to everyone. |
2: | What are some of the more common threats described in RFC 2196? |
A2: | RFC 2196 describes three common threats to a network:
|
3: | What are the key trade-offs that define the corporate security goals? |
A3: | The key trade-offs that define the corporate security goals are as follows:
|
4: | Within the field of network security, what does CIA stand for? |
A4: | Confidentiality, integrity, and availability |
5: | What are some of the physical assets of a network? |
A5: | Physical assets of a network include hardware items, such as computers, switches, firewalls, routers, and other devices, that physically exist on a network. |
6: | What is a privacy policy? |
A6: | A privacy policy defines reasonable expectations for privacy regarding such issues as monitoring of e-mail, logging of keystrokes, and access to users' files. |
7: | What is an acceptable-use policy? |
A7: | An acceptable-use policy defines the boundaries of acceptable use of corporate resources (whether they be physical equipment or network services) as well as the responsibilities of the user in protecting corporate assets and equipment. |
8: | Describe the four phases of the security wheel. |
A8: | The four phases of the security wheel are
|