NETWORK SECURITY CERTIFIED QUESTIONS AND ANSWERS #7
Access control - correct answer a method for determining and assigning privileges to resources
Adware - correct answer produces pop-up messages in internet explorer, the windows
messenger service, or other applications
Algorithms - correct answer a rule or mechanism used to encrypt data
Anti-malware programs - correct answer help to prevent malicious code from executing on the
system
Asymmetric key encryption - correct answer uses a pair of keys, one public and the other
private
Attacker - correct answer a person with malicious intent
Auditing (accounting) - correct answer a stage involving the tracking of user activities and
actions that can include the length of connection time, access types, data transfer, etc.
Authentication - correct answer the process of validating the identity of an individual to the
system
Authorization - correct answer the process of determining the level of access that is going to be
granted to a user based on their identity
Backdoor attack - correct answer an attacker creates an alternative way into the system via
remote access
Block cipher - correct answer encrypts data one block at a time often in 64-bit chunks, which is
more secure but generally slower
, Bluejacking - correct answer a way of spamming a device with messages using a bluetooth
connection
Bluesnarfing - correct answer occurs when an attacker gains unauthorized access to data
contained on the mobile device via a bluetooth connection
Botnets - correct answer systems that are functioning as drones or zombies due to the fact that
a trojan horse has placed undesirable software to allow them to be remotely controlled
Brute-force attacks - correct answer go one character at a time and can utilize special
characters in alphanumeric passwords, making them the most difficult to defend against
Buffer overflows - correct answer used by attackers to fill up and exceed the extent of a
memory buffer, allowing code to be executed against the destination system which can cause
an application to crash, the system to reboot, or any number of other problems
Business continuity plan - correct answer ensures the ongoing availability of the infrastructure
and the services that it provides
Chain of custody - correct answer a paper trail that documents the chronological handling of
evidence and can be used in criminal cases
Change management - correct answer refers to a set of procedures that are followed when
network and/or system changes, that are developed by the network staff, are made
Cia triad - correct answer three fundamental principles that everyone will seek to implement to
ensure the security of corporate assets: confidentiality, which means that private information
needs to remain secure and accessible to authorized parties.
Access control - correct answer a method for determining and assigning privileges to resources
Adware - correct answer produces pop-up messages in internet explorer, the windows
messenger service, or other applications
Algorithms - correct answer a rule or mechanism used to encrypt data
Anti-malware programs - correct answer help to prevent malicious code from executing on the
system
Asymmetric key encryption - correct answer uses a pair of keys, one public and the other
private
Attacker - correct answer a person with malicious intent
Auditing (accounting) - correct answer a stage involving the tracking of user activities and
actions that can include the length of connection time, access types, data transfer, etc.
Authentication - correct answer the process of validating the identity of an individual to the
system
Authorization - correct answer the process of determining the level of access that is going to be
granted to a user based on their identity
Backdoor attack - correct answer an attacker creates an alternative way into the system via
remote access
Block cipher - correct answer encrypts data one block at a time often in 64-bit chunks, which is
more secure but generally slower
, Bluejacking - correct answer a way of spamming a device with messages using a bluetooth
connection
Bluesnarfing - correct answer occurs when an attacker gains unauthorized access to data
contained on the mobile device via a bluetooth connection
Botnets - correct answer systems that are functioning as drones or zombies due to the fact that
a trojan horse has placed undesirable software to allow them to be remotely controlled
Brute-force attacks - correct answer go one character at a time and can utilize special
characters in alphanumeric passwords, making them the most difficult to defend against
Buffer overflows - correct answer used by attackers to fill up and exceed the extent of a
memory buffer, allowing code to be executed against the destination system which can cause
an application to crash, the system to reboot, or any number of other problems
Business continuity plan - correct answer ensures the ongoing availability of the infrastructure
and the services that it provides
Chain of custody - correct answer a paper trail that documents the chronological handling of
evidence and can be used in criminal cases
Change management - correct answer refers to a set of procedures that are followed when
network and/or system changes, that are developed by the network staff, are made
Cia triad - correct answer three fundamental principles that everyone will seek to implement to
ensure the security of corporate assets: confidentiality, which means that private information
needs to remain secure and accessible to authorized parties.