,1. Multiple Choice: Which of the following is considered a
best practice for securing a network?
A) Using weak encryption algorithms
B) Implementing a default-deny firewall policy
C) Disabling security logs
D) Avoiding regular software updates
Correct Answer: B) Implementing a default-deny firewall
policy
Rationale: A default-deny firewall policy ensures that only
explicitly allowed traffic can access the network, minimizing
potential vulnerabilities.
2. Fill-in-the-Blank: __________ is a protocol used to
securely connect to a remote server.
Correct Answer: SSH (Secure Shell)
Rationale: SSH is widely used for secure network
services due to its encryption capabilities, which protect
sensitive data during transmission.
3. True/False: A VLAN offers the same level of security as a
physically separate network.
Correct Answer: False
Rationale: While VLANs provide segmentation and can
help reduce security risks, they do not offer the same
robustness as physically separate networks, which are
isolated at the hardware level.
, C) SQL injection
D) Tailgating
Correct Answers: A) Phishing, B) DDoS, C) SQL injection
Rationale: These are all well-known attack vectors
targeting different aspects of network security, from social
engineering to service disruption and data breaches.
5. Multiple Choice: What is the primary purpose of a
network intrusion detection system (NIDS)?
A) To prevent users from accessing inappropriate
websites
B) To encrypt data packets
C) To monitor network traffic for suspicious activity
D) To serve as a primary firewall
Correct Answer: C) To monitor network traffic for
suspicious activity
Rationale: NIDS are deployed within a network to detect
potential threats by analyzing traffic patterns and identifying
anomalies.
6. Fill-in-the-Blank: The process of transforming readable
data into an unreadable format to prevent unauthorized
access is called __________.
Correct Answer: Encryption
Rationale: Encryption is a fundamental security measure
that protects data confidentiality by making it inaccessible to
unauthorized users.
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ClementeBSC. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.