Professional Documents
Culture Documents
1 A ___ is a network security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.
◯ traffic control ◯ VPN ◯ firewall ◯ encryption
2 Orbiting devices that provide multiple communication channels over a large geographical area are
referred to as wireless LAN.
◯ True ◯ False
3 The standard suite of protocols used by the Internet, intranets, extranets, and some other networks.
◯ TCP/IP ◯ Open Systems Interconnection (OSI) ◯ http/ftp
◯ Client/server networks ◯ Peer-to-peer networks ◯ TLS/AES
4 Extranets are internet-like networks that improve communications and collaboration, publish and
share information, and develop applications to support business operations and decision making
within an organization.
◯ True ◯ False
7 Public-key cryptography is a cryptographic system that uses pairs of keys: public keys and private
keys. The public keys are known only to the owner.
◯ True ◯ False
8 Software that causes unintentional harm due to some deficiency is typically described as a ___.
◯ patch ◯ malware
◯ update ◯ software error ◯ software bug
9 ___ is the act of creating a website, as a hoax, with the intention of misleading visitors to the site.
◯ IP spoofing ◯ Email spoofing
◯ DNS spoofing ◯ Website spoofing
1 Using sniffing tools, attackers can sniff sensitive information from a network, including Email traffic
0 (SMTP, POP, IMAP traffic), Web traffic (HTTP), FTP traffic (Telnet authentication, FTP Passwords,
SMB, NFS) and many more.
◯ True ◯ False
Bonus: Draw the diagram on the back of this page- “ how DDOS attack works”.
Chosen Organization:
Chosen Organization: