DistributedNetworksDistributedNetworks





Security Standards  «Prev  Next»

Security Networks Basics - Quiz

Each question is worth one point. Select the best answer or answers for each question.
 
1. Statistics show that many companies connected to the Internet are not sufficiently secure. Why not?
Please select all the correct answers.
  A. Many companies do not have a written security policy in place.
  B. Many companies do not have physical security for the company networks
  C. Many companies have insufficient protection between the Internet and company networks.
  D. Many companies have insufficient information about the traffic over the company networks.

2. The use of proper security techniques can
Please select all the correct answers.
  A. Minimize the threat of attackers
  B. Allow access to unauthorized users
  C. Prevent most hackers from accessing your system
  D. Provide 100 percent security

3. The characteristics of an effective security system are that the system is
Please select all the correct answers.
  A. Difficult to use, so that prevents access
  B. Highly secure, easy to use, flexible, and scalable
  C. One that provides comprehensive alarming and reporting
  D. Capable of ensuring that there is no hacker activity


4. An intentional hole in a firewall or security apparatus that allows access around security measures is called a
Please select the best answer.
  A. Back door
  B. Buffer overflow
  C. Front door
  D. Trojan horse

5. When planning a security policy for your company, you should
Please select all the correct answers.
  A. Establish Level III security for your publicly exposed servers
  B. Train only your administrators about your security implementation
  C. Classify your systems and assign risk factors
  D. Define the access and activities that are unacceptable

6. Network permissions should be established so that users can accomplish their tasks, but cannot access any system resources that are not necessary so that
Please select the best answer.
  A. A hacker cannot steal a legitimate user's identity
  B. Users will not have access to and misuse system resources
  C. Hackers will not pose as legitimate users
  D. Only the resources authorized for that user will be at risk