UGRD-IT6310 Network Security UPDATED Exam Questions and CORRECT Answers
1 view 0 purchase
Course
UGRD-IT6310 Network Security
Institution
UGRD-IT6310 Network Security
UGRD-IT6310 Network Security
UPDATED Exam Questions and
CORRECT Answers
Data Link Layer enables data transfer between two devices on the same network. - Correct
Answer- True
Based with SANS Technology Institute, it is the process of making preventative measures to
keep the underlying netwo...
UGRD-IT6310 Network Security
UPDATED Exam Questions and
CORRECT Answers
Data Link Layer enables data transfer between two devices on the same network. - Correct
Answer- True
Based with SANS Technology Institute, it is the process of making preventative measures to
keep the underlying networking infrastructure from any unauthorized access. - Correct
Answer- Network Security
Type of software that is often called as end-user programs. - Correct Answer- Application
Software
Refers to the information system which ensures that the information remains accurate. -
Correct Answer- Integrity
An attack where the hacker mimics another employee in the company. - Correct Answer-
Impersonation
It is an end-to-end layer used to deliver messages to a host - Correct Answer- Transport Layer
An abbreviation that is consider as the brains of the computer. - Correct Answer- CPU
It is designed to appear as a legit program to gain access to a network. - Correct Answer-
Trojan Horse
OSI Layer that is sometimes called HCI layer. - Correct Answer- Application Layer
Any form of security incident that is properly handled can and eventually will turn into a
bigger problem. - Correct Answer- False
,Which of the following is not a way on improving basic security. (Choose all that applies) -
Correct Answer- a.
Use easy to remember password
b.
Ignore Updates
c.
Reuse password
d.
Download software to any website available
This attack tries to defeat an authentication mechanism by systematically entering each word
in a dictionary as a password. - Correct Answer- Dictionary Attack
It has an additional ability where they can modify security settings of a software. - Correct
Answer- Spyware
It's anything that can interrupt the operation, functioning, integrity, or availability of a
network or system. - Correct Answer- Threat
It is a security solution by organization to notice any malicious activity in a network. -
Correct Answer- Network Detection
This attack uses any password-cracking software to mathematically calculate every possible
password. - Correct Answer- Brute-Force Attack
Attack that send an email that contains attachment that loads malware onto your computer -
Correct Answer- Phishing
An act that exploits a weakness in a system. - Correct Answer- Attack
, Is any program that is harmful to a computer user. - Correct Answer- Malware
A software that can detect malware. - Correct Answer- Antivirus Software
An attack that allows any unauthorized users a way or passage to get inside a restricted area. -
Correct Answer- Tailgating
Which of these are not part of security model that is very popular to information security. -
Correct Answer- Assurance
it is the one managing the computer hardware resources in addition to applications and data. -
Correct Answer- Operating System
Adware is a type of malware that restricts user access to the computer either by encrypting
files on the hard drive or locking down the system - Correct Answer- False
It is the foundation for all security policies. - Correct Answer- Security Trinity
Worm has the ability to replicate itself without a host program and spread independently
while viruses rely on human activity to spread and damage a system or file. - Correct Answer-
True
Is the process of using social skills to encourage people to disclose their credentials - Correct
Answer- Social Engineering
This is a way of adding secondary layer of security to your account password. - Correct
Answer- Two-factor authentication
It serves as a proof and verifies that you are the person you say you are or what you claim to
be. - Correct Answer- Authentication
Layer that is responsible for establishing and maintaining connections. - Correct Answer-
Session Layer
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.49. You're not tied to anything after your purchase.