1. Drag the network threat on the left to the definition on the right.
a. Data loss –> destroying data on a hard drive
b. Data manipulation –> changing data for personal gain
c. Disruption of service –> overloading a server to reduce its performance
d. Information theft –> stealing data on a hard drive to gain a competitive advantage
e. Identity –> stealing information to impersonate someone and usually to obtain credit.
2. How does a phisher typically contact a victim?
3. A file is downloaded from the internet. After the user opens the downloaded file, the user’s hard drive crashes and all information on the computer is lost. What type of attack occurred?
4. In rapid succession, an intruder tries a large number of possibilities to guess passwords. As a result, other users on the network are locked out. What type of attack occurred?
5. What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?
6. A network administration is troubleshooting a computer that is operating strangely. It boots slowly, programs will not load, and the keyboard responds very slowly. What is the best action for the administrator to take?
Boot the PC and Run anti-virus and anti-spyware applications from an external drive.
7. Drag the term on left to the best description on the right.
a. Stateful packet inspection –> can look inside the packet up through layer 7
b. Website filtering –> allows or denies access based on a URL
c. Simple packet filtering –> allows or denies access based on an IP or MAC address
d. NAT –> keeps external users from knowing the IP Address used inside the network
8. Drag the term on left to the definition on the right.
a. Integrated –> a feature of a network device such as a router.
b. Personal firewall –> an application designed to protect a home PC
c. Appliance-based firewall –> a device that has the sole function of being a firewall
d. Server-based firewall –> an application designed to protect the enterprise network
9. What are three security features commonly found on an ISR? (Choose Three)
10. What are two purposes of a DMZ? (Choose two)
– To create a network area that allows internal resources, such as a web server, to be accessed by external users.
– To establish a network area where network resources can be shared by both internal and external users.