Exam 11: Securing Your Network
Exam 1: Networking: an Overview42 Questions
Exam 2: How Lan and Wan Communications Work42 Questions
Exam 3: Using Network Communication Protocols42 Questions
Exam 4: Connecting Through a Cabled Network42 Questions
Exam 5: Devices for Connecting Networks42 Questions
Exam 6: Connecting Through a Wireless Network42 Questions
Exam 7: Sharing Resources on a Network42 Questions
Exam 8: Using a Server42 Questions
Exam 9: Understanding Wan Connection Choices42 Questions
Exam 10: Basic Network Design42 Questions
Exam 11: Securing Your Network42 Questions
Exam 12: Maintaining and Troubleshooting Your Network42 Questions
Select questions type
A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system.
(Multiple Choice)
4.9/5
(32)
A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.
(Short Answer)
4.9/5
(45)
Stateless filtering screens on the basis of the context of the communication.
(True/False)
4.9/5
(33)
A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.
(True/False)
4.9/5
(36)
_________________________ is designed to "provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality" (as defined in the network standard document, RFC 2406).
(Short Answer)
4.9/5
(28)
A(n)____ is information that a Web server stores on a client computer, such as the client's preferences when accessing a particular Web site, or where the client has been on the Web site.
(Multiple Choice)
4.8/5
(39)
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.
(Multiple Choice)
4.8/5
(30)
Which of the following organizations sponsors the Certified Information Systems Security Professional (CISSP)certification program?
(Multiple Choice)
4.8/5
(34)
Attacks on wireless networks are sometimes called ____ -drives because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.
(Multiple Choice)
4.8/5
(44)
A(n)_________________________ is a portion of a network that exists between two or more networks that have different security measures in place.
(Short Answer)
4.9/5
(33)
____ storage is employed by a computer system to house frequently used data for quick access.
(Multiple Choice)
4.7/5
(35)
____ engineering, in relation to computer system attacks, refers to the use of human interaction to gain access to a system or to do damage.
(Multiple Choice)
4.7/5
(39)
The NAT setup offers addresses in the ____ range as the default option.
(Multiple Choice)
4.8/5
(35)
Provide a general description for how routers are used in border security.
(Essay)
4.9/5
(33)
A set of filtering rules, called a ____, is applied to packets through the use of IPTables.
(Multiple Choice)
4.7/5
(32)
Network devices such as switches use ____, so that when there is heavy network traffic, they have a means to store data until it can be forwarded to the right destination.
(Multiple Choice)
4.9/5
(26)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)