CYBER SECURITY. Overview This event provides recognition for FBLA members who understand security needs for technology.



Similar documents
Description: Objective: Attending students will learn:

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

CMPT 471 Networking II

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

What would you like to protect?

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Firewalls, Tunnels, and Network Intrusion Detection

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Network Security and Firewall 1

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Introduction of Intrusion Detection Systems

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Cornerstones of Security

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

NETWORK SECURITY (W/LAB) Course Syllabus

Section 12 MUST BE COMPLETED BY: 4/22

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Security Technology: Firewalls and VPNs

INTRUSION DETECTION SYSTEMS and Network Security

PART D NETWORK SERVICES

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Compter Networks Chapter 9: Network Security

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall


Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Cisco Certified Security Professional (CCSP)

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

information security and its Describe what drives the need for information security.

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

Firewalls. Chapter 3

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Firewalls. Ahmad Almulhem March 10, 2012

Chapter 9 Firewalls and Intrusion Prevention Systems

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Internet Security Firewalls

INTRODUCTION TO FIREWALL SECURITY

CISCO IOS NETWORK SECURITY (IINS)

Network Defense Tools

Proxy Server, Network Address Translator, Firewall. Proxy Server

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Fundamentals of Network Security - Theory and Practice-

CTS2134 Introduction to Networking. Module Network Security

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Firewalls. CS 6v81 - Network Security. What is a firewall? Firewall capabilities. Firewall limitations. Firewall limitations, cont d

Computer Security: Principles and Practice

How To Protect Your Network From Attack

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Cryptography and network security

PROFESSIONAL SECURITY SYSTEMS

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Firewalls CSCI 454/554

Computer Security DD2395

Network Incident Report

This chapter covers the following topics:

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Firewalls and System Protection

Securing Cisco Network Devices (SND)

Internet Security Firewalls

12. Firewalls Content

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

How To Protect Your Network From Attack From Outside From Inside And Outside

Detailed Description about course module wise:

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

COORDINATED THREAT CONTROL

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Best Practices For Department Server and Enterprise System Checklist

Network Monitoring Tool to Identify Malware Infected Computers

Firewalls and Intrusion Detection

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Overview. Firewall Security. Perimeter Security Devices. Routers

Chapter 7. Firewalls

IDS / IPS. James E. Thiel S.W.A.T.

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

How To Build A Network Security Firewall

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Training Course on Network Administration

Chapter 37. Secure Networks

USM IT Security Council Guide for Security Event Logging. Version 1.1

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Firewalls. Chien-Chung Shen

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Recommended IP Telephony Architecture

Transcription:

CYER SECURITY Overview This event provides recognition for FLA members who understand security needs for technology. Competencies The topics listed below are prioritized, listing first the most important content areas of the tests.. Firewalls o Computer attacks (e.9. virus, span, r Intrusion detection spyware, Trojans, hijackers, worms). Network and physical security. E-mail security. Cryptography. isasterecovery. Public key. Forensic security o Authentication Procedures/Tips. Review the Competitive Events Tips in the front of the book. Web Site Resources. http://www.us-cert.gov/cas/tips/. http://www.howstuffworks.com/firewall.htm. http://www.garykessler.net/library/crypto.html FLA Competitive Events Study Guide 2008-2010 77

Cyber Security Sample Questions 1. A(n) _ needs to have sufficient processor speed and memory to handle the network's presentraffic and increased traffic as the network qrows. a. bastion host b. screening router c. NAT server d. three-prongedfirewall 2. A(n)_ is a client computer that is connected to the Internet and hosts firewall software. a. screening router b. dual-homed host c. multi-firewall MZ d. MZ screened subnet 3. A(n) _ router filters traffic to individual computers within the internal network. a. screenrng b, PIX c. blocking d. reverse 4. A(n) _ is a network that sits outside the internal network but is connected to the firewall and provides publicly available servers. a. stub b. area c. perimeter d. MZ 5. The _ server in the MZ needs only list a limited number of public lp addresses. a. Proxy b. NAT C. NS d. Firewall 6. A(n) _ server is a server that creates a secure tunnel connection. A. VPN b. tunnel c. authentication d. RAIUS 7. A(n) _ firewall is a device that monitors information going out of a network rather than trying to block what is coming in. a. perimeter. reverse C. NAT d. access. Internet Connection Firewall (lcf) is a feature of the a. NetWare 6.x b. Windows XP Professional c. Mac OS X d. Red Hat Linux 9.x operating system FLA Competitive Evenfs Sfudv Guide 2008-2010 78

9. Which of the following is incorrect about firewalls? a. restrict access to specific network resources b. can be a hardware or software solution c. create a protective layer between the network and the outside world d. contain built-in filters 10. A _ is a device that keeps certain kinds of network traffic out of a private network. a. Web server b. firewall c. cookie d. comoiler 11. What is the state when an IS sensor or agent incorrectly identifies an attack as benign traffic called? a. checksum b. false negative c. anomaly d. false positive 12. The IS signature that is based on the packet's TCP or UP port is called: A. NIS b. sensor signature c. lp session logging d. port signature 13. Yourcompany has decided to put intrusion detection software on all servers and workstations. This is called: a. host-based intrusion detection b. Lan-based intrusion detection c. full-servicedetection d. setting traps 14. A computer that is placed on a network to attract attackers is called a: a. lure or a trick b. decoy or a honeypot c. dummy or a firewall d. trao or a snare 15. A process that runs in the background and performs a specified operation at predefined times is called a(n): a. operating system b. daemon c. firewall d. SSH 16. Controlling access to critical network applications, data, and services is called: a. access control b. perimeter security c. security assessment d. encryption FLA Competitive Evenls Sfudy Guide 2008-2010 70

17. The fire marshal in your city has just inspected the wiring that goes through the ceiling on the second floor of your building and says it is dangerous because the network wiring can cause toxic vapors in a fire. What is the wiring most likely to contain? a. Teflon coating b. PVC coating c. rubber insulation d. a hybrid metaljacket 18. Any useful information about the target is called: a. access b. user information c. threat d. knowledge 19. You have decided to use NTFS encryption to enhance security on your network of six servers. Five of the six servers have compressed drives and a new administrator says that it would not be a good idea to implement an encryption policy at this time. Why is or isn't the administrator correct? a. The Administrator is correct. Encryption and compression cannot be used at the same time. b. The administrator is correct. Encryption would add too much overhead to the servers. c. The administrator is not correct. Encryption will help secure your network. d. The administrator is not correct. Encryption will decrease the performance of the servers, but it will not be noticeable to the users. 20. What is the publishedocument called that explains to all users how the CA is structured? a. certificate revocation list b. certificate policy c. certificate practice statement d. certificate server 21. APKI (Public Key Infrastructure)document that serves as the vehicle on which to base common interoperability standards and common assurance criteri as an industry-wide basis is a certificate a. orocess. b. oractice. c. policy. d. orocedure. 22. A(n) threat is one that changes its apparent shape over time, representing a new threat not detectable by techniques that are looking for a preconfigured signature. a. cataleotic b. polymorphic c. metamorohic d. translucent 23. An example of a good password is: a. C73&gh2 b. admin c. helo d. password 24. When the target receives a SYN packet, it replies with a _ A. TCP SYN ACK b. SYN C. TCP RST d. TCPACK packet. FLA Competitive Events Study Guide 2008-2010 O

25. When a virus infects the boot sector of a hard disk: a. the only other place it may infect is memory b. it is common that disks placed in the floppy drive may become infected, too c. the system generally boots faster than normal d. print jobs run out of spool space on the hard disk 26. A is not a virus, but an e-mail falsely warning of a virus. a. buffer attack b. worm c. virus hoax d. Trojan horse 27. A mail user agent is: a. a server that determines how to send an e-mail message along the fastest route b. a program used to compare an e-mail message and to read an e-mail message c. software that transmits an e-mail messaoe d. an e-mail account 28. ecause secure e-mail uses secret encryption keys that only the owners know and have access to, the recipient of the e-mail knows for a fact that is was sent by the person it purports to be from. This feature is called: a. authentication b. nonrepudiation c. integrity d. confidentiality 29. _ protects files and databases in case of an unexpected system crash or power failure by backing out of a data entry that is not fully completed before the system goes down, keeping the file from being corrupted. a. A standby UPS b. Net Ware File Synchronization c. Parallel Processing d. The Transaction Tracking System 30. A(n) is a device that provides power to electronic devices for a limited time period when the power goes out. A. UPS b. RAI C. US d. Nrc FLA Competitive Evenfs Sfudy Guide 2008-2010 8'1

Cyber SecuritY Answer KeY 1) A 2J 3) A 4) 5) C 6) 7) 11 12 13 14 T5 T6 17 e) 19) 10) 20) c atabase esign & Application Answer Key 11) 21) 1) 2)A 3) c 4) s) u) 7) 8) rj) L) 10) n 12 13 '14 T5 16 11 T8 ts 20 esktop Publishing Answcr KeY 1) r) 2)^ 3) C 4l n 6) A t) 8) C 9) 10) A Economics Answer KeY 1) C 2) Il 3) ^ 4)C 5) u) 7) c 8) rl 9) l) 10) A EntaePreneLlrshiP 2) 3),1) s) 6) A 7) C 8) 9) A r0) t) c 11) A 12) A 13) C 14) C 15) 16) 17) 1) 19) "o) (: 11)n 12) C 13) 14) 15) C 16) 17) 1{J) C 19) A 20) Answer KeY ) 12) c 13) 15 17 1S 2A c C 21) C 23) A 24J 25) 27) 28) A 29) 30) A 22 23 24 25 26 21 28 29 30 c C t) a 21) C 22) C 23) C 24) 25) 26) A 2/) 2ti) A 29) n 30) I 21) A?2) 23) 24) '25) A 26) ll 27) 28) 29) 30) c 21) 22) A 23) 24) A 25) 26) C 27) A 28) A 29) 30) FLA Campelitive Evetlts StLtdy GLtide 2a08 2014 240