Exam 11: Network Security
Exam 1: An Introduction to Networking42 Questions
Exam 2: Network Standards and the OSI Model42 Questions
Exam 3: Transmission Basics and Networking Media42 Questions
Exam 4: Introduction to TCP/IP Protocols42 Questions
Exam 5: Topologies and Ethernet Standards40 Questions
Exam 6: Network Hardware, Switching, and Routing42 Questions
Exam 7: Wide Area Networks42 Questions
Exam 8: Wireless Networking41 Questions
Exam 9: In-Depth TCP/IP Networking42 Questions
Exam 10: Virtual Networks and Remote Access42 Questions
Exam 11: Network Security42 Questions
Exam 12: Voice and Video Over IP42 Questions
Exam 13: Troubleshooting Network Problems42 Questions
Exam 14: Ensuring Integrity and Availability42 Questions
Exam 15: Network Management42 Questions
Select questions type
A NOS that contains a "back door"is an example of a risk associated with ____.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
Network security is more often compromised "from the inside" than from external sources.
Free
(True/False)
4.9/5
(41)
Correct Answer:
True
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
(Short Answer)
4.8/5
(26)
Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.
(Essay)
4.9/5
(38)
Describe what distinguishes 802.1x from other authentication standards.
(Essay)
4.9/5
(36)
The combination of a public key and a private key is known as a ____.
(Multiple Choice)
4.8/5
(31)
Define SSH (secure shell) and explain the threats it guards against. Include an explanation of the encryption algorithms that may be used with it.
(Essay)
4.9/5
(38)
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(51)
Describe one potential flaw in CHAP and MS-CHAP authentication and explain how it is resolved.
(Essay)
4.9/5
(35)
In ____, a hacker forges name server records to falsify his host's identity.
(Multiple Choice)
4.8/5
(31)
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
(Short Answer)
4.7/5
(35)
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
(Multiple Choice)
4.8/5
(45)
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
(Multiple Choice)
4.9/5
(26)
In general, information is ____________________ if it could be used by other parties to impair an organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor.
(Short Answer)
5.0/5
(37)
A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
(Short Answer)
4.9/5
(32)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)