Exam 14: Network Security
Exam 1: Introducing Networks42 Questions
Exam 2: Network Devices42 Questions
Exam 3: Tcpip42 Questions
Exam 4: Ip Addressing42 Questions
Exam 5: Router and Ios Basics42 Questions
Exam 6: Router Startup and Configuration42 Questions
Exam 7: Routing Protocols42 Questions
Exam 8: Advanced Routing Protocols42 Questions
Exam 9: Network Services42 Questions
Exam 10: Access Lists42 Questions
Exam 11: Ppp and Frame Relay42 Questions
Exam 12: Basic Switching and Switch Configuration42 Questions
Exam 13: Advanced Switching Concepts42 Questions
Exam 14: Network Security42 Questions
Select questions type
A computer program that can infect a computer without the knowledge or permission of the user is a(n)____.
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
D
An effective security policy implements multiple layers of security.
Free
(True/False)
4.7/5
(34)
Correct Answer:
True
____________________ is the process by which users verify to a server that they are who they say they are.
Free
(Short Answer)
4.8/5
(38)
Correct Answer:
Authentication
____ is an industry-standard protocol that simply provides authentication service.
(Multiple Choice)
4.7/5
(38)
The ____ protocol is governed by RFC 2865 and can be used with cross-platform integration.
(Multiple Choice)
4.9/5
(34)
____ is a suite of protocols, accepted as an industry standard, which provides secure data transmission over layer 3 of the OSI model.
(Multiple Choice)
4.8/5
(32)
A ____ virus is so named because it attempts to hide itself from detection.
(Multiple Choice)
4.7/5
(37)
____________________ refers to malicious programs that have many different capabilities. Some might do something relatively harmless, such as opening files on a CD-ROM; others might be extremely destructive, perhaps destroying all of the data on a computer.
(Short Answer)
4.9/5
(38)
The ____ is the least protective of the four firewall topologies.
(Multiple Choice)
4.8/5
(24)
____ is a means of encrypting a session between two hosts through the use of digital certificates, which are based on asymmetric key encryption.
(Multiple Choice)
4.9/5
(27)
Describe the two IPSec protocols that have been developed to provide packet-level security.
(Essay)
4.8/5
(34)
When a user opens an infected application file or document, a(n) ____ attaches itself to the application and infects other files accessed by the same application.
(Multiple Choice)
5.0/5
(35)
The ____ firewall topology consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host.
(Multiple Choice)
4.8/5
(36)
In network security, a(n) ____________________ is an official approval that allows a user to access a specific network resource.
(Short Answer)
4.8/5
(30)
A ____ VPN allows designated users to have access to the corporate network from remote locations.
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)