Exam 11: Network Management and Security
Exam 1: What Is a Computer Network26 Questions
Exam 2: Network Topology26 Questions
Exam 3: Networking Hardware26 Questions
Exam 4: Ethernet Technology26 Questions
Exam 5: Token-Ring, Fddi, and Other Lan Technologies26 Questions
Exam 6: Network Design and Troubleshooting Scenarios26 Questions
Exam 7: Low-Level Protocols26 Questions
Exam 8: The Tcpip Protocols26 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols26 Questions
Exam 10: Switching and Routing26 Questions
Exam 11: Network Management and Security26 Questions
Exam 12: Electronic Mail26 Questions
Exam 13: Ftp and Telnet26 Questions
Exam 14: Multimedia Networking26 Questions
Exam 15: The Internet26 Questions
Exam 16: Writing a Network Application26 Questions
Exam 17: An Introduction to Networking With Windows26 Questions
Exam 18: Windows Domains26 Questions
Exam 19: Unix and Linux26 Questions
Exam 20: Other Network Operating Systems26 Questions
Exam 21: Cryptography and Security26 Questions
Exam 22: Security Hardware26 Questions
Exam 23: Security Software26 Questions
Exam 24: Forensic Techniques26 Questions
Select questions type
The ____ module converts the server's keyboard, video, and mouse signals for transport over Cat 5 UTP cable and provides interfacing for USB and PS/2 mice.
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
C
A proxy-service firewall provides a combination of packet-filtering and proxy-service in one unit, requiring the most amount of inspection time per packet.
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
A denial-of-service attack (DOS attack) is characterized by an attempt to prevent legitimate users of a service from using that service.
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
List five disaster recovery safeguards that can be used to help guarantee a relatively quick and painless recovery in the event that a disaster occurs.
(Essay)
4.8/5
(29)
A(n) ____________________ allows you to connect the keyboard, video, and mouse signals from two or more computers to a single keyboard, video monitor, and mouse.
(Short Answer)
4.9/5
(37)
A(n) ____________________ device is a network device that you can manage via a network connection, either through an ordinary browser or through special management software that comes with the device.
(Short Answer)
5.0/5
(24)
A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.
(Multiple Choice)
4.7/5
(46)
A ____ is a partitioning of the ports on a VLAN-capable switch into LAN groups whose traffic is isolated from each other.
(Multiple Choice)
4.9/5
(25)
A(n) ____ combines traffic sniffing with analysis techniques.
(Multiple Choice)
4.9/5
(34)
A(n) ____________________ is a program that replicates itself, but does not necessarily infect other programs.
(Short Answer)
4.8/5
(40)
A ____ uses a special switch (typically utilizing Fibre Channel technology) to connect servers and storage devices on their own physical network.
(Multiple Choice)
4.8/5
(39)
____ hardening involves the use of routers, firewalls, IDS systems, and fault tolerance to help provide a protected and highly-available network.
(Multiple Choice)
4.9/5
(33)
____ hardening involves disabling non-essential protocols and services, installing up-to-date service packs, patches, and hotfixes, and properly establishing access control permissions.
(Multiple Choice)
4.7/5
(25)
A(n) ____ is a stand-alone hardware unit that connects to the network or a software program running on a network host, collecting statistical information about the network performance.
(Multiple Choice)
4.8/5
(38)
Network security begins with the security measures in place on the server.
(True/False)
4.8/5
(48)
____ is a technology where high-capacity file storage is directly connected to the network.
(Multiple Choice)
4.7/5
(28)
Showing 1 - 20 of 26
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)