Which of the following defines an event where an alarm does not occur when an actual intrusion is carried out?
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You
read about the different types of alarms and events. Which of the following defines an event where
an alarm does not occur when an actual intrusion is carried out?
What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current
configuration of the IPTables firewall, and notice the following rule:
ipchains -A output -p TCP -d ! 172.168.35.40 www
What is the function of this rule?
What are Network Securitys five major issues?
The organization you work for has recently decided to have a greater focus on security issues.
You run the network, and are called in the meeting to discuss these changes. After the initial
meeting you are asked to research and summarize the major issues of network security that you
believe the organization should address. What are Network Securitys five major issues?
What are Authentication Tokens?
To increase the security of the network, you have decided to implement a solution using
authentication tokens. You are explaining this to a coworker who is not familiar with tokens. What
are Authentication Tokens?
Which of the following defines an event where an alarm does not occur and there is no actual intrusion?
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You
read about the different types of alarms and events. Which of the following defines an event where
an alarm does not occur and there is no actual intrusion?
Which of the following are the reasons that the current auditing has little value?
You were recently hired as the security administrator of a small business. You are reviewing the
current state of security in the network and find that the current logging system must be
immediately modified. As the system is currently configured, auditing has no practical value.
Which of the following are the reasons that the current auditing has little value?
Which of the following best describes an Operational audit?
The main reason you have been hired at a company is to bring the network security of the
organization up to current standards. A high priority is to have a full security audit of the network
as soon as possible. You have chosen an Operational Audit and are describing it to your
coworkers. Which of the following best describes an Operational audit?
Which of the following best describes an Independent Audit?
The main reason you have been hired at a company is to bring the network security of the
organization up to current standards. A high priority is to have a full security audit of the network
as soon as possible. You have chosen an Independent Audit and are describing it to your
coworkers. Which of the following best describes an Independent Audit?
Which of the following best describes Authentication?
You have been hired at a large company to manage network security issues. Prior to your arrival,
there was no one dedicated to security, so you are starting at the beginning. You hold a meeting
and are discussing the main functions and features of network security. One of your assistants
asks what the function of Authentication in network security is. Which of the following best
describes Authentication?
Which of the following best describes Confidentiality?
You have been hired at a large company to manage network security issues. Prior to your arrival,
there was no one dedicated to security, so you are starting at the beginning. You hold a meeting
and are discussing the main functions and features of network security. One of your assistants
asks what the function of Confidentiality in network security is. Which of the following best
describes Confidentiality?