Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
Protocol used to send all Internet Mail.
|
SMTP
|
|
The Melissa virus is an example of this type of attack.
|
E-mail Virus
|
|
Used to capture data or passwords as they cross the network.
|
packet sniffer
|
|
In this type of attack, the intruder intercepts traffic flowing from one person to another and pretends to be the other party.
|
man-in-the-middle
|
|
This type of model has very few layers of bureaucracy between the top and the bottom of the organization.
a. hierarchical and centralized model b. non-hierarchial and decentralized model |
b. non-hierarchial and decentralized
|
|
Most large corporations subscribe to this model.
a. hybid model b. hierarchical and centralized model |
b. hierarchical and centralized model
|
|
This is the most prevalent type of company management.
a. hierarchical and centralized model b. hybrid model |
b. hybrid model
|
|
In this model the corporation is organized around projects and products.
a. Network authentication b. Team model |
b. Team Model
|
|
A small company in which the owner makes all decisions and doesn't delegate management tasks would most closely illustrate this model.
a. non-hierarchical and centralized model b. hierarchical and centralized |
a. non-hierarchical and centralized model
|
|
In this model, all the planning is done at the top of the organization, and the lower levels of the organization are expected to follow only directives from the top.
a. Team Model b.hierarchical and centralized model |
b. hierarchical and centralized model
|
|
During this process, the user is allowed or denied access to specific network services based upon permissions applied.
a. Authentication Services b. Network authentication |
b. Network authentication
|
|
In the Windows 2000 implementation of Kerberos, this is typically the domain controller that stores the directory database containing all users and passwords.
a. Ticket Granting Service b. Public Key Infrastructure c. Key Distribution Center |
c. Key Distribution Center
|
|
In the Windows 2000 implentation of Kerberos, this service issues Session Tickets for access to network resources.
a. Ticket Granting Service b. Public Key Infrastructure |
a. Ticket Granting Service
|
|
The First step in securing network resources.
a. Authentication Service b. NTLM authentication c. User Authentication |
c. User Authentication
|
|
Used to set up certificate-based authentication.
a. User Authentication b. Public Key Infrastructure |
b. Public Key Infrastructure
|
|
In the Windows 2000 implementation of Kerberos, this service issues Ticket Granting Tickets to users.
a. Ticket Granting Service b. Key Distribution Center c. Authentication Service |
c. Authentication Service
|
|
During this process the user logs onto, and is authenticated by, either a local computer or a domain controller.
a. Authenticated user b. NTLM authentication c. Interactive Logon |
c. Interactive Logon
|
|
The Authentication protocol used by a down-level client such as Windows NT when authenticating a user on a Windows 2000 network.
a. NTLM authentication b. Authentication Service c. User Authentication |
a. NTLM authentication
|
|
Contains the file encryption key that the recovery agent can use to decrypt the data if necessary.
a. Data Recovery b. Data Recovery Field |
b. Data Recovery Field
|
|
Which is not true about designing a corporate security plan?
a. It includes designing secure access to services on the network. b. It has to ensure that those people who need access to information can get the right level of access. c. It has to prevent unauthorized people from accessing data. d. None of the above. |
d. None of the above.
|
|
A corportation with high tolerance for risk is not characterized by _____.
a. starting businesses that are similar to the current business b. frequent startups of new companies c. aggressive mergers d. Both A and B |
a. starting businesses that are similar to the current business
|
|
In which company would you be least likely to find decentralized network administration?
a. A medium-sized company with several thousand users, most of whom are located at a corporate head office with several small branch offices. b. A large corporation with multiple locations and thousands of users in each location. c. A corporation that has merged with other companies, and each company remains fairly autonomous. d. Both A and B |
a. A medium-sized company with several thousand users, most of whom are located at a corporate head office with several small branch offices.
|
|
A corporation that gives considerable authority to each location or business unit to manage their own network, while centralizing some services, is exhibiting the ______ network administration model.
a. distributed b. hybrid c. team d. outsourcing |
b. hybrid
|
|
In which situation would the NTLM protocol not be used?
a. A Windows 2000 computer authenticates to a Windows NT-based server. b. A logon request is sent to a Windows 2000 standalone server. c. Authentication to a Windows 2000 Cluster Server environment is required. d. None of the above. |
d. None of the above.
|