UGRD-IT6310 Network Security Questions and Answers 2023 with complete solution
11 views 0 purchase
Course
UGRD-IT6310
Institution
UGRD-IT6310
UGRD-IT6310 Network Security Questions and Answers 2023 with complete solution
Data Link Layer enables data transfer between two devices on the same network.
True
Based with SANS Technology Institute, it is the process of making preventative measures to keep the underlying networking infrastru...
ugrd it6310 network security questions and answers
Written for
UGRD-IT6310
All documents for this subject (9)
Seller
Follow
ACADEMICAIDSTORE
Reviews received
Content preview
UGRD-IT6310 Network Security Questions and Answers
2023 with complete solution
Data Link Layer enables data transfer between two devices on the same network.
True
Based with SANS Technology Institute, it is the process of making preventative
measures to keep the underlying networking infrastructure from any
unauthorized access.
Network Security
Type of software that is often called as end-user programs.
Application Software
Refers to the information system which ensures that the information remains
accurate.
Integrity
An attack where the hacker mimics another employee in the company.
Impersonation
It is an end-to-end layer used to deliver messages to a host
Transport Layer
An abbreviation that is consider as the brains of the computer.
CPU
It is designed to appear as a legit program to gain access to a network.
Trojan Horse
OSI Layer that is sometimes called HCI layer.
Application Layer
Any form of security incident that is properly handled can and eventually will turn
into a bigger problem.
False
Which of the following is not a way on improving basic security. (Choose all that
applies)
a.
Use easy to remember password
b.
Ignore Updates
c.
Reuse password
d.
Download software to any website available
This attack tries to defeat an authentication mechanism by systematically
entering each word in a dictionary as a password.
Dictionary Attack
It has an additional ability where they can modify security settings of a software.
Spyware
, It's anything that can interrupt the operation, functioning, integrity, or availability
of a network or system.
Threat
It is a security solution by organization to notice any malicious activity in a
network.
Network Detection
This attack uses any password-cracking software to mathematically calculate
every possible password.
Brute-Force Attack
Attack that send an email that contains attachment that loads malware onto your
computer
Phishing
An act that exploits a weakness in a system.
Attack
Is any program that is harmful to a computer user.
Malware
A software that can detect malware.
Antivirus Software
An attack that allows any unauthorized users a way or passage to get inside a
restricted area.
Tailgating
Which of these are not part of security model that is very popular to information
security.
Assurance
it is the one managing the computer hardware resources in addition to
applications and data.
Operating System
Adware is a type of malware that restricts user access to the computer either by
encrypting files on the hard drive or locking down the system
False
It is the foundation for all security policies.
Security Trinity
Worm has the ability to replicate itself without a host program and spread
independently while viruses rely on human activity to spread and damage a
system or file.
True
Is the process of using social skills to encourage people to disclose their
credentials
Social Engineering
This is a way of adding secondary layer of security to your account password.
Two-factor authentication
It serves as a proof and verifies that you are the person you say you are or what
you claim to be.
Authentication
Layer that is responsible for establishing and maintaining connections.
Session Layer
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.