DispersedNet
SiteMap
Network Admin
Unix Admin
System Admin
Network Security
Security Structure
«Prev
Next»
Network Security Overview
Security Standards
Security Characteristics
Security System Threat
Social Engineering
Effective Security Systems
Planning Security Policy
System Security Policy
Creating Policy
Organizational Training
Security Standards
Security Basics - Quiz
Effective Security Structure
Important Security Elements
Security Services Standards
Security Definitions
Security Standards
Key Authentification Techniques
Authentication Methods - Quiz
Access Control
Encrypting Decrypting Data
Encryption Methods-
Applied Encryption Processes
Encryption Authentication Processes
Overall Security Plan
Security Elements Conclusion
Securing Protocol Layers
TCP/IP Network
Physical Data Link
IP Internet Layer
TCP/UDP
Application Layer
TCP/IP Applications
Packet Construction
IP Datagrams
TPC/IP Stack Conclusion
Protocol Layers - Quiz
Securing Resources
Securing Resources Services
OS Security
OS Security Quiz
Protecting TCP/IP
CGI Scripts
Securing Email
Testing Evaluating Network
Security Tools
Security Implementation Conclusion
Firewalls in Depth
What is Firewall
Packet Filters
Circuit Level Gateways
Application Gateway
Bastion Host Firewall
Common Firewall Designs
Strategies Goals
Firewall Types
Security Elements - Quiz
Each question is worth one point. Select the best answer or answers for each question.
1.
What is the means used to verify the identity of a user or system called?
Please select the best answer.
A.
Access control
B.
Authentication
C.
Non-repudiation
D.
Identification
2.
What is encryption strength is based on?
Please select the best answer.
A.
The strength of the algorithm, the length of the key, and the secrecy of the key
B.
The privacy of the key, the length of the algorithm, and the strength of the key
C.
The length of the key, the type of algorithm, and the strength of the key
D.
The strength of the key, the length of the algorithm, and the privacy of the key
3.
What should you do to determine the effectiveness of your security implementation?
Please select all the correct answers.
A.
Implement intrusion detection
B.
Use activity logging
C.
Audit your systems regularly
D.
Use known encryption methods
4.
What are the five primary security services?
Please select the best answer.
A.
Data integrity, data security, authentication, repudiation, and verification
B.
Access control, data security, data verification, authentication, and non-repudiation
C.
Data confidentiality, non-repudiation, authentication, access control, and data identity
D.
Authentication, access control, data integrity, non-repudiation, and data confidentiality
5.
Effective security includes the implementation of a training program to ensure that users
Please select all the correct answers.
A.
Choose good passwords
B.
Set proper security on the systems they administer
C.
Remember their login name
D.
Understand the company’s security policy
6.
What is the cryptographic method that proves an information exchange took place?
Please select the best answer.
A.
Authentication
B.
Data verification
C.
Non-repudiation
D.
Symmetric encryption
7.
A specific mechanism used for data confidentiality is
Please select the best answer.
A.
Encryption
B.
Authentication
C.
Algorithm
D.
Key
8.
Authentication using fingerprints, visual identification based on a photograph, or signatures are examples of
Please select the best answer.
A.
Physical authentication
B.
Password authentication
C.
Biometric authentication
D.
Secure authentication
9.
What is a file containing users and groups associated with an object, and the rights that the user or group has when accessing that object called?
Please select the best answer.
A.
A key
B.
An execution control list
C.
A dictionary program
D.
An access control list