Exam 12: Network Security
Exam 1: Introduction to Computer Networks20 Questions
Exam 2: Physical Layer Cabling: Twisted Pair18 Questions
Exam 3: Physical Layer Cabling: Fiber Optics16 Questions
Exam 4: Wireless Networking34 Questions
Exam 5: Interconnecting the Lans13 Questions
Exam 6: Tcp/Ip15 Questions
Exam 7: Introduction to Router Configuration18 Questions
Exam 8: Introduction to Switch Configuration6 Questions
Exam 9: Routing Protocols38 Questions
Exam 10: Internet Technologies: Out to the Internet18 Questions
Exam 11: Troubleshooting28 Questions
Exam 12: Network Security22 Questions
Exam 13: Cloud Computing and Virtualization10 Questions
Exam 14: Codes and Standards16 Questions
Select questions type
Single sign-on (SSO)allows a user to do which of the following?
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
A
An attacker to a network is using social engineering to attack a network.This means which of the following? (Select all that apply.)
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
A, B
The network management is concerned about intrusion problems.The network administrator recommends intrusion detection be placed on the network.This will do which of the following? (Select all that apply.)
Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
B, D
What technology or technologies use the AAA protocol framework?
(Multiple Choice)
4.9/5
(38)
A user who can view a network file but cannot change it lacks which of the following?
(Multiple Choice)
4.9/5
(33)
What wireless security technology replaces WEP as the main security mechanism?
(Multiple Choice)
4.8/5
(34)
What ACL entry would eliminate the effect of the implicit deny?
(Multiple Choice)
4.9/5
(28)
A dictionary attack is being used by an attacker to break into a network.What does this mean?
(Multiple Choice)
4.9/5
(31)
The network administrator suspects that packet sniffing is being used to capture data packets in the network.The network administrator is using an SSH connection for all critical applications,and switches are being used on all network connections.Should the network administrator be concerned?
(Multiple Choice)
4.8/5
(37)
There is a new virus reported on the Internet.What steps should the network administrator take to protect the network from the threat?
(Multiple Choice)
4.9/5
(36)
What is the name for the process of keeping track of user network activity?
(Multiple Choice)
4.9/5
(33)
A network administrator is considering placing a firewall on an internal file server in the network.What is the purpose of the firewall,and is it important for the firewall to be stateful?
(Multiple Choice)
5.0/5
(38)
The network administrator configures a VPN tunnel from a remote office to the main facility.A problem has occurred in the link.Which are the main steps the administrator should take to resolve the problem? (Select all that apply.)
(Multiple Choice)
4.9/5
(31)
Which of the following is a Linux-based port scanner that is now ported to most all operating systems?
(Multiple Choice)
4.8/5
(37)
A network administrator is concerned that the network is vulnerable to a denial-of-service attack.What steps should be taken to reduce this threat? (Select all that apply.)
(Multiple Choice)
4.8/5
(30)
Network operations documentation includes which of the following?
(Multiple Choice)
4.8/5
(38)
Where might you place servers that require access from the public network?
(Multiple Choice)
4.7/5
(36)
Showing 1 - 20 of 22
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)