Network Security Source 2
Network Security Source 2
Network Security Source 2
Question 1
Which of these are not part of the reason why we need to secure our network?
Question 2
Any form of security incident that is not properly handled can and eventually
wont turn into a bigger problem that will lead to a damaging data breach and
wont cause large amount of expense or it will collapse the whole system
It will help the company to provide a better strategy in keeping a data secured
while avoiding intruders to alter or steal important and confidential
information.
System that are intended to manage the computer itself such as the operating
system.
Areas of Security Trinity where they need to have a good security measures to
avoid hackers from getting access to the network.
Answer:
6
Feedback
The correct answer is: 6
Question 14
It has a vital role in an information system because it is the one that allows a
company to link their computers and its users
System that plays a vital part in Network security since it is the information
that an organization is trying to protect and avoid from any unauthorized access
PRELIM QUIZ 2
Question 1
It is an act that exploits a vulnerability.
These are what make networks prone to information loss and downtime
These layers work together to transmit the data from one person to another world
wide.
Two different devices can communicate with each other regardless of the
manufacturer as long as they have the same protocol.
Worms can be classified as a type of computer virus that needs a third party or
a user to replicate and spread through the system.
What are the signs and symptoms that your device/s are getting infected by any
malware. (Choose all that applies)
The correct answers are: Increased CPU usage, Software freezes or crashes,
Slower computer performance, Appearance of strange desktop icons
Question 11
This layer involves devices such as router, UTP Cables and other networking
devices to transfer data.
Type of malware that may contain an attachment to an email that loads malware
onto your computer system.
Brute force attack are often successful because most of the users uses different
ordinary words as their passwords.
It provides data routing paths where data will take for network communication.
PRELIM EXAM
Question 1
Any form of security incident that is properly handled can and eventually will
turn into a bigger problem.
Question text
An abbreviation that is consider as the brains of the computer.
Refers to the information system which ensures that the information remains
accurate.
Data Link Layer enables data transfer between two devices on the same network.
Attack that send an email that contains attachment that loads malware onto your
computer
Which of these are not part of the reason why network security is important
(Choose all that applies)
Which of these are not part of security model that is very popular to
information security.
An attack that allows any unauthorized users a way or passage to get inside a
restricted area.
Which of the following is not a way on improving basic security. (Choose all
that applies)
The correct answers are: Ignore Updates, Download software to any website
available, Use easy to remember password, Reuse password
Question 30
It serves as a proof and verifies that you are the person you say you are or
what you claim to be.
Worm has the ability to replicate itself without a host program and spread
independently while viruses rely on human activity to spread and damage a system
or file.
This attack happens when the attacker or hacker sends too much information to
the application causing it to overflow
Question text
An act that exploits a weakness in a system.
Question text
Adware is a type of malware that restricts user access to the computer either by
encrypting files on the hard drive or locking down the system