Module 1: Introduction to Network Security
Question 1: Which of the following is the best definition for non-repudiation?
- Security that does not allow the potential intruder to deny his/her attack
- -Processes that verify which user performs what action
- It is another term for user authentication
- Access Control
Question 2: What is the acronym of URL?
- Uniform Reserved Location
- Unique Resource Locator
- -Uniform Resource Locator
- Uniformed Resource Location
Question 3: Malware is NOT a common threat for systems.
- True
- –False
Question 4: The most desirable approach to security is one which is:
- Perimeter and dynamic
- Layered and dynamic
- Static and perimeter
- Layered and static
Question 5: What does a blocking attack seek to accomplish?
- Install a virus on a target system
- Shut down security measures
- Prevent legitimate users from accessing a system
- Break into a target system
Question 6: Which port does Trivial File Transfer Protocol (TFTP) run on?
- 110
- 80
- 69
- 194
Question 7: Subnetting is used to split a network into smaller portions.
- True
- False
Question 8: Which of the following is NOT one of the three major classes of threats?
- Denial of service attacks
- A computer virus
- Intruding on a system
- Online auction fraud
Question 9: Class A IPs with range 0-126 are reserved for multicasting.
- True
- False
Question 10: Which port does the Server Message Block (SMB) protocol run on?
- 443
- 8443
- 445
- 21