Exam 9: Introduction to Network Security
Exam 1: Introduction to Computer Networks50 Questions
Exam 2: Network Hardware Essentials47 Questions
Exam 3: Network Topologies and Technologies50 Questions
Exam 4: Network Media46 Questions
Exam 5: Network Protocols49 Questions
Exam 6: Ip Addressing50 Questions
Exam 7: Network Reference Models and Standards42 Questions
Exam 8: Network Hardware in Depth50 Questions
Exam 9: Introduction to Network Security51 Questions
Exam 10: Wide Area Networking and Cloud Computing49 Questions
Exam 11: Network Operating System Fundamentals49 Questions
Exam 12: Network Management and Administration49 Questions
Exam 13: Troubleshooting and Support50 Questions
Select questions type
Firewall rules can be based on which of the following properties? (Choose all that apply.)
(Multiple Choice)
4.8/5
(37)
Match each item with a statement below:
-spreads by replicating itself into programs or documents
(Multiple Choice)
4.8/5
(31)
Which VPN implementation needs no additional configuration to be allowed access through a firewall?
(Multiple Choice)
4.9/5
(38)
Which of the following can be used to secure data on disk drives? (Choose all that apply.)
(Multiple Choice)
4.7/5
(39)
What are the complexity requirements for a Windows password? List the four characteristics.
(Essay)
4.9/5
(31)
Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)
(Multiple Choice)
4.8/5
(46)
____________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
(Short Answer)
4.9/5
(36)
Match each item with a statement below:
-time-dependent malware that can come in different forms.Its main characteristic is that it's activated when a particular event occurs
(Multiple Choice)
4.8/5
(25)
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
(Multiple Choice)
4.8/5
(35)
A Trojan horse is a self-replicating program that masks itself as a useful program but is actually a type of malware.
(True/False)
4.8/5
(20)
Showing 41 - 51 of 51
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)