Exam 6: Network Security
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
B
____ provides remote users with the same access and functionality as local users through a VPN or dial-up connection.
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
B
A ____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.
(Short Answer)
4.8/5
(39)
What are the two TCP/IP protocols used by e-mail systems to send and receive messages?
(Essay)
4.8/5
(31)
A(n) ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
(Multiple Choice)
4.7/5
(39)
____ is a technique that allows private IP addresses to be used on the public Internet.
(Multiple Choice)
4.9/5
(37)
Each operation in a computing environment starts with a ____.
(Multiple Choice)
4.9/5
(38)
____ is a technology that can help to evenly distribute work across a network.
(Multiple Choice)
4.9/5
(41)
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
(True/False)
5.0/5
(30)
A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.
(Multiple Choice)
4.8/5
(36)
A ____ allows scattered users to be logically grouped together even though they may be attached to different switches.
(Multiple Choice)
4.7/5
(40)
A basic level of security can be achieved through using the security features found in network hardware.
(True/False)
4.9/5
(31)
The OSI model breaks networking steps down into a series of six layers.
(True/False)
4.8/5
(34)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)