Exam 7: Administering a Secure Network
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
____ can be used to determine whether new IP addresses are attempting to probe the network.
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
Why is the Physical Layer omitted in the TCP/IP model?
Free
(Essay)
4.8/5
(31)
Correct Answer:
The Physical Layer is omitted in the TCP/IP model. This is because TCP/IP views the Network Interface Layer as the point where the connection between the TCP/IP protocol and the networking hardware occurs.
What are the two types of community strings?
Free
(Essay)
4.9/5
(37)
Correct Answer:
There are two types of community strings: a read-only string will allow information from the agent to be viewed, and a read-write string allows settings on the device to be changed.
____ provides a greater degree of security by implementing port-based authentication.
(Multiple Choice)
4.9/5
(39)
The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number.
(Multiple Choice)
4.9/5
(35)
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
(Essay)
5.0/5
(36)
Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.
(Multiple Choice)
4.9/5
(27)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(32)
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.
(Multiple Choice)
4.9/5
(38)
____ is a pay-per-use computing model in which customers pay only for the computing resources they need.
(Multiple Choice)
4.9/5
(35)
TCP port ____ is the FTP control port used for passing FTP commands.
(Multiple Choice)
4.7/5
(36)
A ____ can create entries in a log for all queries that are received.
(Multiple Choice)
4.9/5
(31)
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
(True/False)
4.8/5
(28)
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
(Short Answer)
4.8/5
(33)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)