Exam 9: Introduction to Network Security
Exam 1: Introduction to Computer Networks50 Questions
Exam 2: Network Hardware Essentials49 Questions
Exam 3: Network Topologies and Techapter: Nologies48 Questions
Exam 4: Network Media49 Questions
Exam 5: Network Protocols49 Questions
Exam 6: Ip Addressing50 Questions
Exam 7: Network Reference Models and Standards48 Questions
Exam 8: Network Hardware in Depth50 Questions
Exam 9: Introduction to Network Security50 Questions
Exam 10: Wide Area Networking and Cloud Computing50 Questions
Exam 11: Network Operating System Fundamentals50 Questions
Exam 12: Network Management and Administration50 Questions
Exam 13: The Internet of Things50 Questions
Exam 14: Troubleshooting and Support50 Questions
Select questions type
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
(Multiple Choice)
4.9/5
(36)
If the minimum password length on a Windows system is set to zero, what does that mean?
(Multiple Choice)
4.8/5
(29)
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity
(Essay)
4.9/5
(37)
A security policy should clearly state the desired rules, even if they cannot be enforced.
(True/False)
4.9/5
(29)
Which protocol works by establishing an association between two communicating devices and can use a preshared key for authentication?
(Multiple Choice)
4.7/5
(31)
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-monopolizes network services or network bandwidth
(Essay)
4.8/5
(37)
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-malware that's activated when a particular event occurs
(Essay)
4.9/5
(19)
What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?
(Multiple Choice)
4.9/5
(26)
What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?
(Multiple Choice)
4.9/5
(30)
A rootkit is a self-replicating program that masks itself as a useful program but is actually a type of malware.
(True/False)
4.8/5
(31)
A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.
(True/False)
4.7/5
(38)
Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)
(Multiple Choice)
4.8/5
(29)
What type of policy defines the methods involved when a user sign in to the network?
(Multiple Choice)
4.9/5
(39)
Which VPN implementation typically needs no additional firewall configuration to be allowed access through the firewall?
(Multiple Choice)
4.7/5
(43)
How the network resources are to be used should be clearly defined in a (an) ____________ policy.
(Short Answer)
4.7/5
(32)
Which of the following are true about WPA3? (Choose all that apply.)
(Multiple Choice)
4.8/5
(43)
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
(Multiple Choice)
4.9/5
(38)
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-packets are denied on context as well as packet properties
(Essay)
4.9/5
(33)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)