Sabtu, 30 Oktober 2010

chapter 8 quiz


JAWABAN CHAPTER 8 QUIZ:
1.drag the network threat on the left to the definition on the right
Data loss
Data manipulation
Distruption of service
Information theft
Identify theft

2.how does a phisher typically contact a victim?
·         By email
·         By telephone
·         By voice over IP phone
·         Through a person they know in common
3.a file is download from the internet.after the user opens the downloaded file,the user’s hard drive crashes and all information on the computer is lost.what type of attack occurred?
·         Worm
·         Virus
·         Trojan horse
·         Denial of service
4.in rapid succession,an intruder tries a large number of possibilities to guess passwords.as a result,other users on the network are locked out.what type of attack occurred?
·         DDoS
·         Brute force
·         Ping of death
·         SYN flooding
5.what type of program installs and gathers personal information,including password and account informations,from a computer without permission of knowledge of the user?
·         Adware
·         Pop-ups
·         Spyware
·         Pop-unders
6.a nework administrator is roubelshooting a computer that is operating strangely.it boots slowly,programs will not load,and the keyboard responds very slowly.what is the best action for the administrator to take?
·         Attack a different keyboard
·         Attack the pc to the internet to check its operating system website for patches
·         Add the pc to your network to see if it can communicate with other pcs
·         Boot the pc and run anti virus and anti spyware application from an external drive
7.drag the term on the left to the best description on the right
Stateful packet inspection
Website filtering
Simple packet filtering
NAT

8.drag the term on the left to the definition on the right
Integrated firewall
Personal firewall
Appliance based firewall
Server based firewall

9.what are three security features commonly found on an ISR ?(choose three)
·         DMS
·         NAT
·         SPI
·         HTTP
·         POP3
·         Server-based firewall
10.what are two purpose of a DMZ?(choose two)
·         To translate internal private addresses into outside public adresses
·         To create a software based firewall on a server that perform other functions
·         To prevent or deny access to a network device based on the type of application being used
·         To create a network area that allowas internal resources,such as web server,to be accessed by external users
·         To establish a network area where nework area resources can be shared by both internal and external users
·         To create a safe network area that allows a corporate web server to be accesed by internal user only

Tidak ada komentar:

Posting Komentar