Exam 11: Network Management and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ module converts the server's keyboard, video, and mouse signals for transport over Cat 5 UTP cable and provides interfacing for USB and PS/2 mice.

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

C

A proxy-service firewall provides a combination of packet-filtering and proxy-service in one unit, requiring the most amount of inspection time per packet.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

A denial-of-service attack (DOS attack) is characterized by an attempt to prevent legitimate users of a service from using that service.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

List five disaster recovery safeguards that can be used to help guarantee a relatively quick and painless recovery in the event that a disaster occurs.

(Essay)
4.8/5
(29)

A(n) ____________________ allows you to connect the keyboard, video, and mouse signals from two or more computers to a single keyboard, video monitor, and mouse.

(Short Answer)
4.9/5
(37)

A(n) ____________________ device is a network device that you can manage via a network connection, either through an ordinary browser or through special management software that comes with the device.

(Short Answer)
5.0/5
(24)

A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.

(Multiple Choice)
4.7/5
(46)

A ____ is a partitioning of the ports on a VLAN-capable switch into LAN groups whose traffic is isolated from each other.

(Multiple Choice)
4.9/5
(25)

What is a firewall?

(Short Answer)
4.8/5
(41)

List and describe five areas to consider in User Management.

(Essay)
4.9/5
(35)

A(n) ____ combines traffic sniffing with analysis techniques.

(Multiple Choice)
4.9/5
(34)

A(n) ____________________ is a program that replicates itself, but does not necessarily infect other programs.

(Short Answer)
4.8/5
(40)

A ____ uses a special switch (typically utilizing Fibre Channel technology) to connect servers and storage devices on their own physical network.

(Multiple Choice)
4.8/5
(39)

____ hardening involves the use of routers, firewalls, IDS systems, and fault tolerance to help provide a protected and highly-available network.

(Multiple Choice)
4.9/5
(33)

____ hardening involves disabling non-essential protocols and services, installing up-to-date service packs, patches, and hotfixes, and properly establishing access control permissions.

(Multiple Choice)
4.7/5
(25)

A(n) ____ is a stand-alone hardware unit that connects to the network or a software program running on a network host, collecting statistical information about the network performance.

(Multiple Choice)
4.8/5
(38)

List and describe the different types of hardening.

(Essay)
4.9/5
(34)

Integrity of information is achieved through encryption.

(True/False)
5.0/5
(35)

Network security begins with the security measures in place on the server.

(True/False)
4.8/5
(48)

____ is a technology where high-capacity file storage is directly connected to the network.

(Multiple Choice)
4.7/5
(28)
Showing 1 - 20 of 26
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)