cybersecurity 11

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Microsoft Baseline Security Analyzer (MBSA) checks one or more Windows machines to see if they have basic security in place.

true

2
New cards

Nessus is the premiere network vulnerability scanner.

true

3
New cards

Experience is the most important factor when looking for a security professional.

true

4
New cards

CNE, MCITP, CISSP, and CCNA are examples of industry certifications.

true

5
New cards

Every open port on a router is a possible avenue of entry for a malware or intruder.

true

6
New cards

For individual computers not running firewall software, you should directly close ports.

false

7
New cards

Windows has a built in firewall, but Linux does not.

false

8
New cards

There should be a firewall between your network and the outside world.

true

9
New cards

A good password should contain only letters and numbers.

false

10
New cards

A good rule of thumb for a password history policy is a history depth of five.

true

11
New cards

The first rule of computer security is to check ___________.

patches

12
New cards

Any _________ you do not explicitly need should be shut down.

ports

13
New cards

For an individual machine that is not running firewall software, you do not directly close ports. You shut down the _________ using that port.

None of the above

14
New cards

A password policy for a 90- or 180-day replacement schedule is called password

age

15
New cards

You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password. This is particularly important if your password policy has a history depth of five.

Minimum password age

16
New cards

A good password has at least ______ characters.

8

17
New cards

Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year.

once

18
New cards

The process to make a system as secure as it can be without adding on specialized software or equipment is _______________

Hardening

19
New cards

On a server, you should create your own accounts with ________ that reflect their level of permission.

names

20
New cards

A _________ involves setting up two firewalls: an outer and an inner firewall.

DMZ (demilitarized zone)

21
New cards

The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.

routers