Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Single sign-on (SSO)allows a user to do which of the following?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

A

An attacker to a network is using social engineering to attack a network.This means which of the following? (Select all that apply.)

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

A, B

The network management is concerned about intrusion problems.The network administrator recommends intrusion detection be placed on the network.This will do which of the following? (Select all that apply.)

Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
Verified

B, D

What technology or technologies use the AAA protocol framework?

(Multiple Choice)
4.9/5
(38)

A user who can view a network file but cannot change it lacks which of the following?

(Multiple Choice)
4.9/5
(33)

What wireless security technology replaces WEP as the main security mechanism?

(Multiple Choice)
4.8/5
(34)

What ACL entry would eliminate the effect of the implicit deny?

(Multiple Choice)
4.9/5
(28)

A dictionary attack is being used by an attacker to break into a network.What does this mean?

(Multiple Choice)
4.9/5
(31)

Authentication methods are based on _______.

(Multiple Choice)
4.9/5
(37)

Which is not a stage of forensics examination?

(Multiple Choice)
4.7/5
(36)

The network administrator suspects that packet sniffing is being used to capture data packets in the network.The network administrator is using an SSH connection for all critical applications,and switches are being used on all network connections.Should the network administrator be concerned?

(Multiple Choice)
4.8/5
(37)

There is a new virus reported on the Internet.What steps should the network administrator take to protect the network from the threat?

(Multiple Choice)
4.9/5
(36)

What is the name for the process of keeping track of user network activity?

(Multiple Choice)
4.9/5
(33)

A network administrator is considering placing a firewall on an internal file server in the network.What is the purpose of the firewall,and is it important for the firewall to be stateful?

(Multiple Choice)
5.0/5
(38)

The network administrator configures a VPN tunnel from a remote office to the main facility.A problem has occurred in the link.Which are the main steps the administrator should take to resolve the problem? (Select all that apply.)

(Multiple Choice)
4.9/5
(31)

When would a network administrator use L2TP?

(Multiple Choice)
4.9/5
(36)

Which of the following is a Linux-based port scanner that is now ported to most all operating systems?

(Multiple Choice)
4.8/5
(37)

A network administrator is concerned that the network is vulnerable to a denial-of-service attack.What steps should be taken to reduce this threat? (Select all that apply.)

(Multiple Choice)
4.8/5
(30)

Network operations documentation includes which of the following?

(Multiple Choice)
4.8/5
(38)

Where might you place servers that require access from the public network?

(Multiple Choice)
4.7/5
(36)
Showing 1 - 20 of 22
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)