Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
100% found this document useful (1 vote)
51 views4 pages

Network Security Test Questions

The document presents 10 questions about network security concepts such as security services, security mechanisms, passive and active attacks, and ways to protect oneself.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
51 views4 pages

Network Security Test Questions

The document presents 10 questions about network security concepts such as security services, security mechanisms, passive and active attacks, and ways to protect oneself.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Test 2 - Network Security

Question 1
0.03 / 0.03 pts
Security services:

They allow the implementation of security mechanisms.

They allow for attacks on information systems.

To access security services it is necessary to employ mechanisms of


security.

None of the above.

Question 2
0.03 / 0.03 points
The security mechanisms:

They allow security attacks to be implemented.

Each of them allows for several security services.

They can only be physical and organizational procedures.

None of the above.

Question 3
0.03 / 0.03 pts
In a passive attack:

The attacker modifies the content of the encrypted messages.

The victim machines are blocked by a Denial of Service Attack


Service.

The attacker observes a communication and obtains the transmitted data.

None of the above.


Test 2 - Network Security

Question 4
0.03 / 0.03 pts
The authentication service:

Cannot be employed when the user is away from the system.


information.

Allow only the appropriate users to read the information


confidential.

It is the prior step to access control service.

Responses A and B are correct.

Question 5
0.03 / 0.03 pts
The data integrity service:

Allows detecting changes in data integrity.

It allows avoiding changes to data integrity.

It allows avoiding and detecting changes in data integrity.

None of the above.

Question 6
0.03 / 0.03 pts
The service of non-repudiation at the origin:

It allows you to ensure that a user has sent a message.

It allows me to ensure that a user has received a message.

Answers A and B are correct.


Test 2 - Network Security

None of the above.

Question 7
0.03 / 0.03 pts
The traffic fill-in:

It is based on the inclusion of repeated messages in certain


communications.

It aims to saturate the bandwidth of communication to prevent attacks from


denial of service.

It is based on the grouping and joint sending of valid messages.

None of the above.

Question 8
0.03 / 0.03 pts
An identity theft attack:

It is a passive attack.

It is an active attack.

It is an attack that can be prevented by using a confidentiality service.

None of the above.

Question 9
0.03 / 0.03 pts
Denial of service attacks:

They pose a threat to the confidentiality of the system.


Test 2 - Network Security

They pose a threat to the integrity of the system.

Answers A and B are correct.

None of the above.

Question 10
0.03 / 0.03 pts
To protect against a passive message content retrieval attack:

An authentication service is necessary that could be provided through a


digital signature mechanism.

An integrity service is necessary that could be provided through a


digital signature mechanism.

A confidentiality service is necessary that could be provided through


a digital signature mechanism.

A confidentiality service is necessary that could be provided through


a cryptographic mechanism.

You might also like