1: | Why is network security becoming increasingly important?- Information is more important today than it has been in the past.
- Vendors do not provide sufficient security in their products.
- Attackers are posing an increasing threat to the capabilities of businesses to function efficiently and securely.
- Network attacks are launched not only from external sources but also increasingly from within the network.
- b and c are correct.
- c and d are correct.
|
2: | What are the two primary reasons for the increasing threat to network systems?- Network administrators are not diligent in securing their networks.
- The Internet is ubiquitous.
- Vendors are not diligent in eliminating software bugs.
- Easy-to-use operating systems and development environments have become pervasive.
- b and d are correct.
- a and c are correct.
|
3: | Within the scope of network security, what does CIA stand for?- Common information assurance
- Confidentiality, identification, and assurance
- Core Internet attacks
- Confidentiality, integrity, and availability
|
4: | What does a network security policy do?- Describes the procedures to secure a network
- Defines the framework used to protect the assets connected to a network
- Provides legal and financial guidance to secure a network
- Describes a network's level of security
|
5: | What is the main goal of a network security policy?- To ensure that system users, staff, and managers are informed of their responsibilities for protecting corporate technology and information assets
- To secure the network so that attackers cannot gain access
- To provide a framework that is used to protect computers on a network and ensure that users authenticate their identity
- To provide legal protection to the IT staff
|
6: | What three characteristics should a network security policy have?- It should be implementable, capable of defining roles, and enforceable
- It should be administrative, managerial, and understandable
- It should be definable, restrictive, and enforceable
- It should be implementable, understandable, and enforceable
|
7: | What are the two types of network security policies?- Administrative
- Restrictive
- Managerial
- Permissive
|
8: | What are some of the elements of a network security policy?- Acceptable-use policy
- Download policy
- Encryption policy
- Extranet policy
- All of the above
|
9: | What is a risk assessment?- A process of determining the vulnerabilities on a network
- The reduction of the level of risk in a network
- The ability to verify that risk exists
- A verification that no risk exists in the network
- A method that allows the level of risk inherent in a system to be quantified
|
10: | What is the Security Wheel?- It defines network security as a continuous process that is built around the corporate security policy.
- It is a system whereby once the network is secured according to the outline of the security policy, the network is considered secure.
- It defines the method that is used to secure a network.
- None of the above.
|
11: | Which of the following are phases of the Security Wheel? Select all that apply.- Security policy implementation
- Testing
- Monitoring and detection
- Improvement
- Analysis
- All of the above
|