Exam 11: Network Security
Exam 1: An Introduction to Networking42 Questions
Exam 2: Network Standards and the OSI Model42 Questions
Exam 3: Transmission Basics and Networking Media42 Questions
Exam 4: Introduction to TCP/IP Protocols42 Questions
Exam 5: Topologies and Ethernet Standards40 Questions
Exam 6: Network Hardware, Switching, and Routing42 Questions
Exam 7: Wide Area Networks42 Questions
Exam 8: Wireless Networking41 Questions
Exam 9: In-Depth TCP/IP Networking42 Questions
Exam 10: Virtual Networks and Remote Access42 Questions
Exam 11: Network Security42 Questions
Exam 12: Voice and Video Over IP42 Questions
Exam 13: Troubleshooting Network Problems42 Questions
Exam 14: Ensuring Integrity and Availability42 Questions
Exam 15: Network Management42 Questions
Select questions type
____ protocols are the rules that computers follow to accomplish authentication.
(Multiple Choice)
4.9/5
(36)
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
(Multiple Choice)
4.7/5
(41)
In ____, both computers verify the credentials of the other.
(Multiple Choice)
4.8/5
(32)
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
(Multiple Choice)
4.8/5
(28)
A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.
(Multiple Choice)
4.8/5
(35)
A(n) ____________________ identifies an organization's security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
(Short Answer)
4.7/5
(36)
RADIUS and TACACS belong to a category of protocols known as AAA (____).
(Multiple Choice)
4.8/5
(34)
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
(True/False)
4.8/5
(32)
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can't respond to any of them.
(Multiple Choice)
4.8/5
(43)
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
(Multiple Choice)
4.8/5
(29)
Describe who should conduct a security audit and the advantages of doing so, if any.
(Essay)
4.8/5
(33)
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
(Multiple Choice)
5.0/5
(33)
The use of certificate authorities to associate public keys with certain users is known as ____.
(Multiple Choice)
4.9/5
(33)
____ is a method of encrypting TCP/IP transmissions above the network layer.
(Multiple Choice)
4.8/5
(34)
A(n) ____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
(Multiple Choice)
4.8/5
(30)
In a ____ attack, a person redirects or captures secure transmissions as they occur.
(Multiple Choice)
4.9/5
(31)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)