12.1 - Security Concepts

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Which of the following BEST describes an inside attacker?

An unintentional threat actor (the most common threat).

2
New cards

Which of the following is an example of an internal threat?

A user accidentally deletes the new product designs.

3
New cards

Telnet is inherently unsecure because its communication is in plaintext and is easily intercepted. Which of the following is an acceptable alternative to Telnet?

SSH

4
New cards

Which of the following protocols can you use to securely manage a network device from a remote connection?

SSH

5
New cards

Which protocol does HTTPS use to offer greater security for web transactions?

SSL

6
New cards

You want to allow traveling users to connect to your private network through the internet. Users will connect from various locations, including airports, hotels, and public access points (like coffee shops and libraries). As such, you won't be able to configure the firewalls that might be controlling access to the internet in these locations.

Which of the following protocols is MOST likely to be allowed through the widest number of firewalls?

SSL

7
New cards

Which of the following protocols are often added to other protocols to provide secure data transmission? (Select two.)

TLS

SSL

8
New cards

Which of the following intrusion detection and prevention systems uses fake resources to entice intruders by displaying a vulnerability, configuration flaw, or valuable data?

HoneyPot

9
New cards

Creating fake resources such as honeypots, honeynets, and tarpits fulfills which of the following main intrusion detection and prevention goals? (Select two.)

Reveals information about an attacker's methods and gathers evidence for identification or prosecution purposes.

Offers attackers a target that occupies their time and attention while distracting them from valid resources.

10
New cards

Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks.

You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches have been installed.

Which solution should you use?

NAC