Exam 10: Introduction to Network Security
Exam 1: Introduction to Networks and Networking Concepts48 Questions
Exam 2: Network Design Essentials44 Questions
Exam 3: Networking Media46 Questions
Exam 4: Network Interface Cards52 Questions
Exam 5: Making Networks Work47 Questions
Exam 6: Network Communications and Protocols51 Questions
Exam 7: Network Architectures45 Questions
Exam 8: Simple Network Operations50 Questions
Exam 9: Understanding Complex Networks55 Questions
Exam 10: Introduction to Network Security48 Questions
Exam 11: Supporting a Small Business Network49 Questions
Exam 12: Network Administration and Support50 Questions
Exam 13: Enterprise and Wide Area Networks47 Questions
Exam 14: Solving Network Problems46 Questions
Select questions type
______________________________ (WEP)provides data encryption so that a casual attacker who gains access to your wireless signals sees only encrypted gibberish.
(Short Answer)
4.8/5
(36)
Digital certificates involve a third party called a(n)_________________________ (CA).
(Short Answer)
4.9/5
(35)
____ allows administrators to control who has access to the network.
(Multiple Choice)
4.8/5
(45)
____ are temporary or permanent connections across a public network-such as the Internet-that use encryption technology to transmit and receive data.
(Multiple Choice)
4.7/5
(30)
____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.
(Multiple Choice)
4.9/5
(31)
A(n)____________________ firewall is installed on a computer or server and simply inspects all packets coming into or leaving the computer.
(Short Answer)
4.9/5
(29)
In Windows OSs, with ____ permissions administrators can assign permissions to files as well as folders, so one level of permission can be assigned to a folder but a different level of permission assigned to files in the folder, if needed.
(Multiple Choice)
5.0/5
(40)
Showing 41 - 48 of 48
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)