You are on page 1of 3

Answer Sheet

Score = ___________

Rating: ____________

Name: _________________________ Date: _______________


LO3:- Monitor threats to the network

L03- KEY ANSWERS:

SELF CHECK 1:

1. C
2. D

SELF CHECK 2:

1. B
2. D
3. B
4. B
5. C

SELF CHECK 3:

1. Write method Physical threats controlling ?


 Fence
 Guards
 Gate locks
 Lock devices(network device and computers)
2. Write some measures that you can take in order to minimize the risks associated
with malicious human threats?
 Data Storage in Safe Locations
 Virus and Spyware Protection
 Human Errors
 Hardware Damage
 Protecting hardware from accidental and environmental damages:
 Backing up Data

SELF CHECK 4:

1. Define Data Encryption?

1
Encrypting data uses codes and ciphers. Traffic between resources and computers on
the network can be protected from attackers monitoring or recording transactions by
implementing encryption.

2. Write types Data Backups?


 Frequency of backups
 Storage of backups
 Security of backups

3. Define Secure Shell (SSH)?


Secure Shell (SSH) is a network protocol for secure data communication, remote shell
services or command execution and other secure network services between two
networked computers
4. What the difference between Symmetric and Asymmetric ciphers?
In a symmetric cipher, both parties must use the same key for encryption and
decryption. This means that the encryption key must be shared between the two parties
before any messages can be decrypted. Symmetric systems are also known as shared
secret systems or private key systems.Symmetric ciphers are significantly faster than
asymmetric ciphers, but the requirements for key exchange make them difficult to use.
In an asymmetric cipher, the encryption key and the decryption keys are separate. In an
asymmetric system, each person has two keys. One key, the public key, is shared
publicly. The second key, the private key, should never be shared with anyone.
SELF CHECK 5:

1. Define security policy should describe a company addresses security issues?

 Define a process for handling network security incidents


 Define a process to audit existing network security
 Define a general security framework for implementing network security
 Define behaviors that are allowed
 Define behaviors that are prohibited

2. Write methods of physically protecting computer equipment?

 Control access to facilities


 Use cable locks with equipment
2
 Keep telecommunication rooms locked
 Fit equipment with security screws
 Use security cages around equipment
 Label and install sensors, such as Radio Frequency Identification (RFID) tags, on
equipment

SELF CHECK 6:

1. List two levels of password protection are recommended?

 BIOS – Prevents BIOS settings from being changed without the appropriate password
 Login – Prevents unauthorized access to the network

2. Write some basic precautions to help protect against social engineering?

 Never give out your password


 Always ask for the ID of unknown persons
 Restrict access of unexpected visitors
 Escort all visitors
 Never post your password in your work area
 Lock your computer when you leave your desk
 Do not let anyone follow you through a door that requires an access card

You might also like