MAGIC SQUARE – Advanced Security—Chapter 16

Take the number of the statement that best describes the word in the box and place it over the word in the box. If they are all right, each column and each row will total up to be the magic number.

Total

Software firewall / Notify
me / home / Hash encoding / proxy
normal / Restrict access / Intrusion detection system / Packet filtering / hardware firewall
Security policy / dongle / Username or password / SSID / automatic
tunnels / Smart card / MAC address / Restrictive security policy / physical
biometric / WPA / Closed ended / Anti-virus / Encryption key

Total ______

  1. _____ computers are more likely to have wireless intrusions than business computers.
  2. A computer accessing the Internet should include a firewall and ______software.
  3. In addition to firewalls and antivirus software, computers that access the internet also need _____ security.
  4. A ______ is a collection of rules, guidelines and checklists.
  5. Biometrics, fences, door locks, etc., are designed to ______.
  6. Using a USB security ______ is one way to protect data from unauthorized access.
  7. A(n) ______ monitors changes in the program codes for unusual activity and sends reports if code is modified.
  8. MD5 is an example of ______.
  9. The ______ is kept undisclosed in symmetric encoding.
  10. In a VPN network, the secured data pipelines between points are called ______.
  11. Fingerprints or eye patterns are examples of ______security.
  12. A ______ might be used for ID badges.
  13. security key fob may require the computer to sense a signal over a short range before accepting a ______.
  14. A ______ firewall allows or denies traffic based on things such as IP addresses, protocols and ports.
  15. A ______ firewall acts as a gateway that protects computers inside the network.
  16. A ______ is a separate physical device that inspects data packets from the network before they reach the computers on the network.
  17. A ______ reduces the computer user’s performance because it uses the computer’s resources.
  18. ______provides better encryption and authentication than WEP.
  19. ______ filtering should not be used alone to restrict access to only certain hosts.
  20. In a wireless network, the ______ broadcasts the identify of the network.
  21. Opening only the required ports on a firewall is an example of a ______.
  22. ______ updates installs updates without user assistance.
  23. A full or ______ backup archives copies of all files on the drive.
  24. When using a dial-up network, you should use the ______ method for updates.
  25. “When was the last time you were able to log on successfully?” is an example of a ______ question.