DistributedNetworks DistributedNetworks


Securing Resources   «Prev  Next»
 

Securing Resources - Quiz

Securing Resources Review


Each question is worth one point. Some questions ask you to select the best answer, others ask you to select all the correct answers. To receive credit for questions asking for all the correct answers, you must select all the correct answers and only the correct answers.

1. What is the most common attack that affects the transport layer of the TCP/IP protocol stack?
Please select the best answer.
  A. A SYN flood attack using the TCP protocol
  B. Embedded messages in UDP datagrams
  C. Excessive data sent over a Telnet connection
  D. The receipt of viruses and Trojan horses

2. What privilege should be allowed to avoid compromising accounts on an FTP server?
Please select the best answer.
  A. Only authenticated user accounts at the FTP server
  B. Only encrypted messages at the FTP server
  C. Only anonymous connections to the FTP server
  D. Only administrator access to the FTP server

3. To prevent security holes in scripts such as CGI, Perl, and ISAPI scripts, you should
Please select all the correct answers.
  A. Place scripts on a separate partition in the hard drive
  B. Place the operating system on a partition separate from all other servers and scripts.
  C. Assign read-only privileges to the scripts and HTML files
  D. Do not allow writing to the drive containing the scripts

4. What measures should be implemented to provide security for your network’s operating system?
Please select all the correct answers.
  A. Create special partitions for system defaults
  B. Install bug-free software
  C. Establish access restrictions for users and groups
  D. Remove services that you do not require

5. What measure should be employed to secure an email server?
Please select all the correct answers.
  A. Password sniffing
  B. Authentication
  C. Virus scanning
  D. Email encryption

6. When introducing a new security setting or to implement a new system, you must
Please select all the correct answers.
  A. Test on a system server with your network operating as usual
  B. Place new systems on a server not connected with your network
  C. Implement the system under simulated normal operating conditions
  D. Verify that the new security setting functions on your network


7. What type of security tool uses a database of known security problems and tests networks against this information?
Please select the best answer.
  A. Log analysis tool
  B. Operating system add-on
  C. Access control list
  D. Network scanner