Exam 10: Security in Network Design
Exam 1: Introduction to Networking50 Questions
Exam 2: Network Infrastructure and Documentation50 Questions
Exam 3: Addressing on Networks50 Questions
Exam 4: Network Protocols and Routing50 Questions
Exam 5: Network Cabling50 Questions
Exam 6: Wireless Networking50 Questions
Exam 7: Virtualization and Cloud Computing50 Questions
Exam 8: Subnets and VLANs50 Questions
Exam 9: Network Risk Management50 Questions
Exam 10: Security in Network Design50 Questions
Exam 11: Network Performance and Recovery50 Questions
Exam 12: Wide Area Networks50 Questions
Select questions type
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
C
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
B
The Wired Equivalent Privacy standard had what significant disadvantage?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
What is the difference between an Intrusion Detection System and an Intrusion Protection System?
(Essay)
4.8/5
(37)
Describe the TACACS+ AAA protocol, and detail how it differs from RADIUS.
(Essay)
4.9/5
(32)
What are the three components required to manage access control to a network and its resources?
(Essay)
4.7/5
(39)
Which legacy authentication protocol requires mutual authentication?
(Multiple Choice)
4.7/5
(35)
In regards to the use of local authentication, what statement is accurate?
(Multiple Choice)
4.8/5
(31)
A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
(True/False)
4.7/5
(31)
Which of the following is an example of proxy server software?
(Multiple Choice)
4.8/5
(35)
If your LAN utilizes a proxy server, and you wish to send an email message from your workstation inside the LAN to a colleague via the Internet, what does this process look like?
(Essay)
4.9/5
(37)
What IEEE standard includes an encryption key generation and management scheme known as TKIP?
(Multiple Choice)
4.9/5
(37)
The Group Policy utility can be opened by typing what name into a Run box?
(Multiple Choice)
4.9/5
(29)
Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options.
(True/False)
4.8/5
(29)
In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value?
(Multiple Choice)
4.8/5
(36)
By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.
(True/False)
4.9/5
(33)
When utilizing Kerberos, an access granting ticket is the same as a key.
(True/False)
4.8/5
(38)
You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?
(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)