Exam 6: Network Security
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
____________________ work occasionally or regularly from a home office.
(Short Answer)
4.9/5
(28)
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
(True/False)
4.7/5
(34)
____ keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
(Multiple Choice)
4.9/5
(27)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(39)
Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring
(Multiple Choice)
4.9/5
(37)
____ is typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
(Multiple Choice)
4.7/5
(34)
Networks are usually segmented by using ____________________ to divide the network into a hierarchy.
(Short Answer)
4.8/5
(34)
____ switches are connected directly to the devices on a network.
(Multiple Choice)
4.9/5
(38)
NAT replaces a private IP address with a(n) ____________________ IP address.
(Short Answer)
4.8/5
(31)
A(n) ____ encrypts all data that is transmitted between the remote device and the network.
(Multiple Choice)
4.8/5
(20)
In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____.
(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)