Exam 10: Security in Network Design
Exam 1: Introduction to Networking50 Questions
Exam 2: Network Infrastructure and Documentation50 Questions
Exam 3: Addressing on Networks50 Questions
Exam 4: Network Protocols and Routing50 Questions
Exam 5: Network Cabling50 Questions
Exam 6: Wireless Networking50 Questions
Exam 7: Virtualization and Cloud Computing50 Questions
Exam 8: Subnets and VLANs50 Questions
Exam 9: Network Risk Management50 Questions
Exam 10: Security in Network Design50 Questions
Exam 11: Network Performance and Recovery50 Questions
Exam 12: Wide Area Networks50 Questions
Select questions type
When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?
(Multiple Choice)
4.8/5
(46)
Enforcing a virtual security perimeter using a client's geographic location is known by what term?
(Multiple Choice)
4.9/5
(37)
User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders.
(True/False)
4.9/5
(38)
The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process.
(True/False)
4.8/5
(42)
Which protocol designed to replace STP operates at Layer 3 of the OSI model?
(Multiple Choice)
4.8/5
(32)
The storm-control command is a type of flood guard that is available on most major network switch vendor platforms.
(True/False)
4.9/5
(31)
How does the Remote Authentication Dial-In User Service (RADIUS) function?
(Essay)
4.7/5
(36)
The Spanning Tree Protocol operates at the Network layer of the OSI model.
(True/False)
5.0/5
(36)
Which encryption standard was originally utilized with WPA's TKIP?
(Multiple Choice)
4.9/5
(37)
What kind of firewall can block designated types of traffic based on application data contained within packets?
(Multiple Choice)
4.8/5
(35)
What statement regarding role-based access control is accurate?
(Multiple Choice)
4.9/5
(33)
What is a SIEM (Security Information and Event Management) system utilized for?
(Multiple Choice)
4.9/5
(35)
The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop.
(True/False)
5.0/5
(36)
When using Spanning Tree Protocol, what is the first step in selecting paths through a network?
(Multiple Choice)
4.9/5
(26)
What descendant of the Spanning Tree Protocol is defined by the IEEE 802.1W standard, and can detect as well as correct for link failures in milliseconds?
(Multiple Choice)
4.8/5
(37)
What is NOT a variable that an network access control list can filter traffic with?
(Multiple Choice)
4.9/5
(39)
What aspect of AAA is responsible for determining what a user can and cannot do with network resources?
(Multiple Choice)
4.8/5
(27)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)