UGRD-IT6310 Network Security | Questions
Solved 100% Correct| Verified
Which of these are not part of the reason why network security is important (Choose all that
applies) - ✔✔a.
To expose company assets
b.
To keep your job as network administrator
c.
To gain a competitive advantage
d.
To take advantage of competitors confidential information
In implementing network security, company should invest more in preventing or avoiding any
security breach over detecting and responding to any form of attack - ✔✔True
It is the connection of two or more computer that share its resources - ✔✔Network
It is a type of an injection attack that makes it possible to insert and execute malicious SQL
statements - ✔✔SQL Injection
It determines whether you are allowed to access a specific information or file. -
✔✔authorization
,Which of these are not part of the reason why we need to secure our network? - ✔✔To
exploit vulnerabilities in the system
An information that is only accessed by an authorized person. - ✔✔Confidential information
Internet is an example of a network. - ✔✔True
Areas of Security Trinity where they need to have a good security measures to avoid hackers
from getting access to the network. - ✔✔Prevention
Availability refers to the ability of a network to protect its information from any unauthorized
access. - ✔✔False
It is the network security solution by an institute to
any malicious activity in a network. - ✔✔detect
It is considered as a crucial part of information systems - ✔✔Security
It has a vital role in an information system because it is the one that allows a company to link
their computers and its users - ✔✔Network
System that plays a vital part in Network security since it is the information that an organization
is trying to protect and avoid from any unauthorized access - ✔✔Information
Any form of security incident that is not properly handled can and eventually wont turn into a
bigger problem that will lead to a damaging data breach and wont cause large amount of
expense or it will collapse the whole system - ✔✔False
, System that are intended to manage the computer itself such as the operating system. -
✔✔System Software
It is the tangible parts of a computer system. - ✔✔Hardware
It is the process of taking preventative measures to keep the network infrastructure from any
unauthorized access, misuse of important information - ✔✔Network Security
It is a model designed to guide policies for information security within an organization. -
✔✔CIA Triad Information Security
It ensures that the information in an information system is accurate. - ✔✔Integrity
It is a structured procedure for taking care of any security incidents, breaches, and network
threats. - ✔✔Response
It will help the company to provide a better strategy in keeping a data secured while avoiding
intruders to alter or steal important and confidential information. - ✔✔Security Trinity
How many key phases are there in an incident response plan ? - ✔✔6
Big corporations are not at risks to any form of security breach. - ✔✔False
It has been developed by ISO in the year 1984. - ✔✔OSI Reference Model
Two different devices can communicate with each other regardless of the manufacturer as long
as they have the same protocol. - ✔✔True
Solved 100% Correct| Verified
Which of these are not part of the reason why network security is important (Choose all that
applies) - ✔✔a.
To expose company assets
b.
To keep your job as network administrator
c.
To gain a competitive advantage
d.
To take advantage of competitors confidential information
In implementing network security, company should invest more in preventing or avoiding any
security breach over detecting and responding to any form of attack - ✔✔True
It is the connection of two or more computer that share its resources - ✔✔Network
It is a type of an injection attack that makes it possible to insert and execute malicious SQL
statements - ✔✔SQL Injection
It determines whether you are allowed to access a specific information or file. -
✔✔authorization
,Which of these are not part of the reason why we need to secure our network? - ✔✔To
exploit vulnerabilities in the system
An information that is only accessed by an authorized person. - ✔✔Confidential information
Internet is an example of a network. - ✔✔True
Areas of Security Trinity where they need to have a good security measures to avoid hackers
from getting access to the network. - ✔✔Prevention
Availability refers to the ability of a network to protect its information from any unauthorized
access. - ✔✔False
It is the network security solution by an institute to
any malicious activity in a network. - ✔✔detect
It is considered as a crucial part of information systems - ✔✔Security
It has a vital role in an information system because it is the one that allows a company to link
their computers and its users - ✔✔Network
System that plays a vital part in Network security since it is the information that an organization
is trying to protect and avoid from any unauthorized access - ✔✔Information
Any form of security incident that is not properly handled can and eventually wont turn into a
bigger problem that will lead to a damaging data breach and wont cause large amount of
expense or it will collapse the whole system - ✔✔False
, System that are intended to manage the computer itself such as the operating system. -
✔✔System Software
It is the tangible parts of a computer system. - ✔✔Hardware
It is the process of taking preventative measures to keep the network infrastructure from any
unauthorized access, misuse of important information - ✔✔Network Security
It is a model designed to guide policies for information security within an organization. -
✔✔CIA Triad Information Security
It ensures that the information in an information system is accurate. - ✔✔Integrity
It is a structured procedure for taking care of any security incidents, breaches, and network
threats. - ✔✔Response
It will help the company to provide a better strategy in keeping a data secured while avoiding
intruders to alter or steal important and confidential information. - ✔✔Security Trinity
How many key phases are there in an incident response plan ? - ✔✔6
Big corporations are not at risks to any form of security breach. - ✔✔False
It has been developed by ISO in the year 1984. - ✔✔OSI Reference Model
Two different devices can communicate with each other regardless of the manufacturer as long
as they have the same protocol. - ✔✔True