Computer Science 202: Network and System Security  /  Computer Science Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Introduction to Network Security Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. What is the first thing that a developer should try to do in the event of a zero day vulnerability?

Question 2 2. What first aid technique is most like a patch that is immediately released to stop a zero day vulnerability?

Question 3 3. How many days does a team have to respond to a zero day vulnerability?

Question 4 4. Within each security zone, there is a level of _____ that allows for the sharing of resources and communication between a higher level security zone and a lower level security zone.

Question 5 5. A/An _____ is the internal network of an organization that is secured behind one or more firewalls and has a medium level of restrictions with certain controls in place to monitor network traffic.

Page 2

Question 6 6. _____ is the physical or logical isolation of one or more layers within a security zone.

Question 7 7. What is a data modification attack?

Question 8 8. Which of these is a type of attack that can start off as passive then turn active?

Question 9 9. A spy keeping track of communications between two heads of state would likely use which of these?

Question 10 10. The type of network security threat that employs fraudulent attempts to obtain private information is called _____

Page 3

Question 11 11. Besides a direct attack on a network by a hacker, which security threat below is the next most worrisome

Question 12 12. According to network security engineers and other experts in the security field, the likelihood of eliminating all security threats is _____.

Question 13 13. Which of the following is NOT considered by network security testing?

Question 14 14. Which of the following network security testing considerations deals with wireless access points?

Question 15 15. Which of the following is NOT considered a network security threat?

Page 4

Question 16 16. Which of the following is NOT a threat network security protects against?

Question 17 17. What is the goal of network security design?

Question 18 18. Which of the following network security issues concerns the application of a network resource in an incorrect fashion?

Question 19 19. An example of an internal network security threat is:

Question 20 20. A/An _____ specifies proper utilization of company computer resources and how to protect private information.

Page 5

Question 21 21. A network security policy:

Question 22 22. If you are using administrative policies to enhance your network security, which of the following would you NOT be doing?

Question 23 23. When can a network security hardware appliance stop threats on the network?

Question 24 24. A multi-layered approach to network security is best because _____.

Question 25 25. In addition to network security operators, who might be involved with network security?

Page 6

Question 26 26. What is something that is part of the network that wouldn't have been twenty years ago?

Question 27 27. Which of the following is NOT an element of access in regards to network security?

Question 28 28. Which of the following is a characteristic of Network Security?

Question 29 29. Which of the following is NOT mitigated by Network Security?

Question 30 30. Which of the following network security mitigations involves login?

Introduction to Network Security Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Support