Exam 13: Network Protection Systems
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
What router feature provides basic security by mapping internal private IP addresses to public external IP addresses,essentially hiding the internal infrastructure from unauthorized personnel?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
Match each item with a statement below.
-Administrator can perform full router configuration tasks
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
G
Match each item with a statement below.
-Used for verification,takes a variable-length input and converts it to a fixed-length output string
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
E
Match each item with a statement below.
-IDS systems that don't take any action to stop or prevent an activity
(Multiple Choice)
4.7/5
(25)
To examine the router's routing table,a Cisco administrator would enter which command?
(Multiple Choice)
4.9/5
(32)
What type of packet filtering records session-specific information about a network connection,including the ports a client uses?
(Multiple Choice)
4.7/5
(36)
Routers operate at the Network layer of the TCP/IP protocol stack.
(True/False)
4.7/5
(30)
When Web site visitors are involved in downloading malicious code without their knowledge,they may be unknowingly involved in what type of process?
(Multiple Choice)
4.7/5
(35)
A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment,risk remediation,and legal consultation?
(Multiple Choice)
4.8/5
(31)
Match each item with a statement below.
-Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm
(Multiple Choice)
4.9/5
(37)
What type of function is being performed when a router screens packets based on information in the packet header?
(Multiple Choice)
4.9/5
(31)
What type of IDS/IPS is used to protect a critical network server or database server by installing the IDS or IPS software on the system you're attempting to protect?
(Multiple Choice)
4.9/5
(37)
What type of an IDS is being used when it does not take any action to stop or prevent an activity occurring?
(Multiple Choice)
4.8/5
(38)
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting,aggregating,and correlating log and alert data from routers,firewalls,IDS/IPS,endpoint logs,Web filtering devices,and other security tools?
(Multiple Choice)
4.8/5
(36)
Match each item with a statement below.
-Uses a single key to encrypt and decrypt data
(Multiple Choice)
4.7/5
(39)
What are the advantages and disadvantages of hardware and software firewalls?
(Essay)
4.8/5
(38)
Showing 1 - 20 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)