Exam 9: Introduction to Network Security
Exam 1: Introduction to Computer Networks50 Questions
Exam 2: Network Hardware Essentials49 Questions
Exam 3: Network Topologies and Techapter: Nologies48 Questions
Exam 4: Network Media49 Questions
Exam 5: Network Protocols49 Questions
Exam 6: Ip Addressing50 Questions
Exam 7: Network Reference Models and Standards48 Questions
Exam 8: Network Hardware in Depth50 Questions
Exam 9: Introduction to Network Security50 Questions
Exam 10: Wide Area Networking and Cloud Computing50 Questions
Exam 11: Network Operating System Fundamentals50 Questions
Exam 12: Network Management and Administration50 Questions
Exam 13: The Internet of Things50 Questions
Exam 14: Troubleshooting and Support50 Questions
Select questions type
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-a self-contained, self-replicating program
(Essay)
4.9/5
(42)
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
(Multiple Choice)
4.8/5
(33)
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
(Multiple Choice)
4.9/5
(34)
Someone who wants to send encrypted data must acquire a digital certificate from a ____________ authority.
(Short Answer)
4.8/5
(31)
You have been asked to determine what services are accessible on your network so you can close those that are not necessary. What tool should you use?
(Multiple Choice)
4.9/5
(37)
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-used to discover breaches in security
(Essay)
4.9/5
(28)
Which Windows domain-based protocol provides mutual authentication between devices?
(Multiple Choice)
4.9/5
(36)
Match each item with a statement below.
a.digital certificates
b.virus
c.denial-of-service
d.firewall
e.preshared key
f.logic bomb
g.worm
h.stateful packet inspection
i.IDS
j.backdoor
-inspects packets as they go into and out of the network
(Essay)
4.8/5
(34)
You have purchased a network-based IDS. You have been tasked with deploying the device in a location where the entire network can be protected. Where should you deploy it?
(Multiple Choice)
4.8/5
(35)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)