Exam 7: Physical and Network Topology Security
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
Which type of network device provides immediate battery power to equipment during a power failure or brownout?
(Multiple Choice)
4.8/5
(28)
____________________ is the transmission capacity of a communications medium, which is typically measured in bits per second (for data communications) or in hertz (for data voice and video communications), and is determined by the maximum minus the minimum transmission capacity.
(Short Answer)
4.9/5
(40)
Which type of network device connects two or more cable segments and retransmits any incoming signal to all other segments?
(Multiple Choice)
4.8/5
(35)
In Netware 6.x after you use the SECURE CONSOLE command, you cannot disable it without rebooting the server.
(True/False)
4.8/5
(31)
Twisted-pair cabling is more flexible than coax cable and therefore better for running through walls and around corners.
(True/False)
4.9/5
(38)
Does physical security further involve the location of computers and network devices in a building, along with the construction quality of that building?
(True/False)
4.7/5
(45)
Which type of network device links network segments and forwards and filters frames between segments?
(Multiple Choice)
4.8/5
(28)
What is the biggest disadvantage of shielded twisted-pair cabling?
(Multiple Choice)
4.9/5
(38)
It is more difficult with a(n) star topology than with the traditional bus topology for someone to create an unauthorized tap into the network, because they need access to the central hub or switch.
(True/False)
4.9/5
(42)
____________________ is a protocol in the TCP/IP suite that enables computers and network equipment to gather standardized data about network activity.
(Short Answer)
4.9/5
(36)
_________________________ refers to installing cable that fans out in a horizontal star fashion from one or more centralized hubs or switches, which are located in telecommunications rooms or wiring closets.
(Short Answer)
4.8/5
(32)
When working with twisted-pair cabling, solid shielding is used for indoor wiring, and corrugated shielding is used for outside or underground wiring.
(True/False)
4.9/5
(29)
Which operating system uses XScreenSaver to lock the screen?
(Multiple Choice)
4.8/5
(42)
Is it easy for someone to place unauthorized taps into fiber-optic cable?
(True/False)
4.9/5
(44)
In a(n) ____________________ server security model, the physical security used for servers may vary widely from server to server and department to department.
(Short Answer)
4.7/5
(38)
The physical side of the network is how the signal is transferred from point to point along the cable.
(True/False)
4.9/5
(40)
In Red Hat Linux 9.x, is SNMP typically installed during the initial installation of the operating system on TCP/IP servers?
(True/False)
4.9/5
(43)
Showing 41 - 60 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)