Exam 9: Introduction to Network Security
Exam 1: Introduction to Computer Networks50 Questions
Exam 2: Network Hardware Essentials47 Questions
Exam 3: Network Topologies and Technologies50 Questions
Exam 4: Network Media46 Questions
Exam 5: Network Protocols49 Questions
Exam 6: Ip Addressing50 Questions
Exam 7: Network Reference Models and Standards42 Questions
Exam 8: Network Hardware in Depth50 Questions
Exam 9: Introduction to Network Security51 Questions
Exam 10: Wide Area Networking and Cloud Computing49 Questions
Exam 11: Network Operating System Fundamentals49 Questions
Exam 12: Network Management and Administration49 Questions
Exam 13: Troubleshooting and Support50 Questions
Select questions type
Which facet of securing access to network data makes data unusable to anyone except authorized users?
(Multiple Choice)
4.7/5
(32)
Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.
(Essay)
4.8/5
(47)
What type of device should you install as a decoy to lure potential attackers?
(Multiple Choice)
4.8/5
(37)
Match each item with a statement below:
-packets are denied on context as well as packet properties
(Multiple Choice)
4.8/5
(43)
What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?
(Multiple Choice)
4.7/5
(29)
What are the two VPN modes that are available with most VPN servers?
(Short Answer)
4.8/5
(29)
How the network resources are to be used should be clearly defined in a (an)____________ policy.
(Short Answer)
5.0/5
(39)
Match each item with a statement below:
-permits access to computer,bypasses normal authentication
(Multiple Choice)
4.7/5
(39)
What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?
(Multiple Choice)
4.9/5
(38)
Which of the following is NOT a guideline of a security policy?
(Multiple Choice)
4.8/5
(34)
When using BitLocker to encrypt your entire disk,which mode must you use if your system is not configured for TPM support?
(Multiple Choice)
4.7/5
(28)
If the minimum password length on a Windows system is set to zero,what does that mean?
(Multiple Choice)
4.8/5
(27)
Match each item with a statement below:
-monopolizes network services or network bandwidth
(Multiple Choice)
4.9/5
(30)
Which of the following is a protocol that centralizes authentication,authorization,and accounting?
(Multiple Choice)
4.9/5
(41)
Match each item with a statement below:
-documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
(Multiple Choice)
4.8/5
(34)
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
(Multiple Choice)
4.7/5
(29)
A DoS attack ties up network bandwidth or services,rendering resources useless to legitimate users.
(True/False)
4.8/5
(38)
Removal of ______________ is very difficult because they alter system files and drivers the system depends on to run.
(Short Answer)
4.8/5
(30)
Showing 21 - 40 of 51
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)