Exam 10: Introduction to Network Security
Exam 1: Introduction to Networks and Networking Concepts48 Questions
Exam 2: Network Design Essentials44 Questions
Exam 3: Networking Media46 Questions
Exam 4: Network Interface Cards52 Questions
Exam 5: Making Networks Work47 Questions
Exam 6: Network Communications and Protocols51 Questions
Exam 7: Network Architectures45 Questions
Exam 8: Simple Network Operations50 Questions
Exam 9: Understanding Complex Networks55 Questions
Exam 10: Introduction to Network Security48 Questions
Exam 11: Supporting a Small Business Network49 Questions
Exam 12: Network Administration and Support50 Questions
Exam 13: Enterprise and Wide Area Networks47 Questions
Exam 14: Solving Network Problems46 Questions
Select questions type
A ____ is similar to a virus in that it's self-replicating, but it doesn't attach itself to another program; rather, it's a self-contained program.
(Multiple Choice)
4.8/5
(26)
Firewalls can attempt to determine the context of a packet; this process is called ______________________________ (SPI).
(Short Answer)
4.9/5
(34)
WEP, the successor to WPA, has enhancements that make it much more difficult to crack the encryption code.
(True/False)
4.8/5
(38)
A ____ is a program that spreads by replicating itself into other programs or documents.
(Multiple Choice)
4.8/5
(31)
What are the basic guidelines that a network security policy should follow?
(Essay)
4.8/5
(37)
____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.
(Multiple Choice)
4.8/5
(38)
____ monitors or in some way controls part of your computer at the expense of your privacy and to the gain of some third party.
(Multiple Choice)
4.8/5
(41)
Windows OSs ____ permissions are applied to folders (and only folders)shared over the network.
(Multiple Choice)
4.8/5
(32)
Attackers who drive around looking for wireless LANs to intercept are called ____.
(Multiple Choice)
4.8/5
(35)
A(n)____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.
(Multiple Choice)
4.8/5
(34)
A ____ program appears to be something useful, such as a free utility, but in reality contains some type of malware.
(Multiple Choice)
4.9/5
(35)
A(n)____________________ address is a source address inserted into the packet that isn't the actual address of the sending station.
(Short Answer)
4.8/5
(33)
An intrusion detection system (IDS)usually works with a firewall or router with access control lists.
(True/False)
4.8/5
(31)
The most popular method for encrypting data as it travels network media is to use an extension to the IP protocol called ____.
(Multiple Choice)
4.9/5
(32)
IPSec is an excellent way to secure data as it travels across a network, and to secure data on disk drives to block someone from gaining unauthorized access to the computer.
(True/False)
4.8/5
(35)
Showing 21 - 40 of 48
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)