KEMBAR78
Network Security | PDF | Malware | Computer Virus
0% found this document useful (0 votes)
63 views7 pages

Network Security

Scareware scares users into thinking they have viruses and provides malicious links to "fix" the problem.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views7 pages

Network Security

Scareware scares users into thinking they have viruses and provides malicious links to "fix" the problem.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 7

Scares the user into thinking they have lots of viruses.

Provides a malicious link to ‘fix the problem’

- Scareware

Submitted answers: [ Scareware ]

Which of the following is true regarding access lists applied to an interface?

- One access list may be configured, per direction, for each layer 3 protocol configured on an interface

Submitted answers: [ One access list may be configured, per direction, for each layer 3 protocol
configured on an interface ]

Self replicate without any user help meaning they can spread very quickly.

- Worm

Submitted answers: [ Worm ]

What router command allows you to determine whether an IP access list is enabled on a particular
interface?

- show ip interface

Submitted answers: [ show ip interface ]

“password” is a bad choice for a password.

- True

Submitted answers: [ True ]


Malware is another name for computer viruse

- False

Submitted answers: [ False ]

It is any software designed to damage or to disrupt a system.

- Malicious software (malware)

Submitted answers: [ Malicious software (malware) ]

What will the result of this access list be?

- No IP traffic will be allowed out E0

Submitted answers: [ No IP traffic will be allowed out E0 ]

Which of the following is an example of a standard IP access list?

- access-list 1 deny 172.16.10.1 0.0.0.0

Submitted answers: [ access-list 1 deny 172.16.10.1 0.0.0.0 ]

The following are the goals of network security, EXCEPT;

- Asset Assessment

Submitted answers: [ Asset Assessment ]


In computer security, ……………………. means that computer system assets can be modified only by
authorized parities.

- Integrity

Submitted answers: [ Integrity ]

Which of the following is independent malicious program that need not any host program?

- Worm

Submitted answers: [ Worm ]

A ………….. is a program that can infect other programs by modifying them, the modification includes a
copy of the virus program, which can go on to infect other programs.

- Virus

Submitted answers: [ Virus ]

____________ is used to describe those hackers who use their computer skills with malicious intent for
illegal purposes or nefarious activities

- Black Hats

Submitted answers: [ Black Hats ]

State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy
of itself on another system.

- True, True
Submitted answers: [ True, True ]

The goal of ______________ is to reduce the exposure of the organization to malicious code.

- Anti-virus

Submitted answers: [ Anti-virus ]

" Imagine the status/service of a bank if its customers are unable to make transactions using their
accounts ".This scenario refers to what goals of network security ……..

- Availability

Submitted answers: [ Availability ]

Identify which of the following is NOT a potential risk to the network security.

- Anti-virus Protection

Submitted answers: [ Anti-virus Protection ]

Confidentiality with asymmetric-key cryptosystem has its own

- Problems

Submitted answers: [ Problems ]

Secure Hash Algorithm 1 (SHA-l) has a message digest of

- 160 bits
Submitted answers: [ 160 bits ]

To check the integrity of a message, or document, the receiver creates the

- hash tag

Submitted answers: [ hash tag ]

A digital signature needs a

- public-key system

Submitted answers: [ public-key system ]

Encryption and decryption provide secrecy, or confidentiality, but not

- integrity

Submitted answers: [ integrity ]

A computer virus is a

- Software

Submitted answers: [ Software ]

MAC stands for

- Message Authentication Code


Submitted answers: [ Message Authentication Code ]

The digest created by a hash function is normally called a

- modification detection code (mdc)

Submitted answers: [ modification detection code (mdc) ]

Message confidentiality is using

- asymmetric-key

Submitted answers: [ asymmetric-key ]

To preserve the integrity of a document, both the document and the fingerprint are

- needed

Submitted answers: [ needed ]

A sender must not be able to deny sending a message that was sent, is known as

- message nonrepudiation

Submitted answers: [ message nonrepudiation ]

Network Security provides authentication and access control for resources.

- True
Submitted answers: [ True ]

You might also like