Exam 11: Securing Your Network
Exam 1: Networking: an Overview42 Questions
Exam 2: How Lan and Wan Communications Work42 Questions
Exam 3: Using Network Communication Protocols42 Questions
Exam 4: Connecting Through a Cabled Network42 Questions
Exam 5: Devices for Connecting Networks42 Questions
Exam 6: Connecting Through a Wireless Network42 Questions
Exam 7: Sharing Resources on a Network42 Questions
Exam 8: Using a Server42 Questions
Exam 9: Understanding Wan Connection Choices42 Questions
Exam 10: Basic Network Design42 Questions
Exam 11: Securing Your Network42 Questions
Exam 12: Maintaining and Troubleshooting Your Network42 Questions
Select questions type
____ is unrequested e-mail that is sent to hundreds, thousands, or even millions of users.
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
C
If you want to block access to Telnet using a firewall, then consider blocking TCP/UDP port ____.
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
B
Provide a description of service packs.
Free
(Essay)
4.9/5
(37)
Correct Answer:
Service packs are designed to address security issues as well as problems affecting stability, performance, or the operation of features included with the operating system.
Service packs come out less frequently than the patches you obtain from Windows Update, but they generally include, in one place, patches that can be obtained from Windows Update, major fixes, new operating system features, and any previous service packs.
The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.
(Multiple Choice)
4.8/5
(32)
Application level gateways are restricted to a single level of filtering.
(True/False)
4.8/5
(37)
Identify five Microsoft Routing and Remote Access Services that enable or manage remote access to Windows Server 2003.
(Essay)
4.9/5
(32)
____ goes to the source of the TCP/IP communications by securing IP in its Network layer, or Layer 3.
(Multiple Choice)
4.8/5
(30)
____ can translate an IP address from a private network to a different address used on a public network or the Internet.
(Multiple Choice)
4.8/5
(36)
____________________ involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
(Short Answer)
4.7/5
(42)
In ____ routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.
(Multiple Choice)
4.8/5
(40)
Virtual private networks (VPNs)can be set up to provide secure remote communications.
(True/False)
4.9/5
(34)
The Trojan horse named ____ is designed to give the attacker the target's user account and password.
(Multiple Choice)
4.8/5
(35)
Identify five border points that the strongest border security is designed to protect.
(Essay)
4.8/5
(32)
On the sending computer using IPSec, the data is encrypted at the ____ layer.
(Multiple Choice)
4.9/5
(24)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(32)
Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer, such as a Web server.
(Multiple Choice)
4.8/5
(33)
On a UNIX/Linux system, IPSec can be configured using the ____ function with the spdadd instruction in a shell script.
(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)