Exam 11: Module a Networking Concepts
Exam 1: The Threat Environment69 Questions
Exam 2: Planning and Policy105 Questions
Exam 3: Cryptography101 Questions
Exam 4: Secure Networks81 Questions
Exam 5: Access Control63 Questions
Exam 6: Firewalls68 Questions
Exam 7: Host Hardening78 Questions
Exam 8: Application Security67 Questions
Exam 9: Data Protection69 Questions
Exam 10: Incident and Disaster Response67 Questions
Exam 11: Module a Networking Concepts79 Questions
Select questions type
All computer standards were initially created with security.
Free
(True/False)
4.7/5
(35)
Correct Answer:
False
The bottom layer of the TCP/IP standard is the ________.
Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
A
The ________ field allows the receiver to find errors.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
Security that results from the inherent operation of a standard is called ________.
(Multiple Choice)
4.8/5
(25)
The main standard at the internet layer is the Internet Protocol.
(True/False)
4.9/5
(29)
Companies use carriers for WAN transmission because ________.
(Multiple Choice)
4.9/5
(32)
A home network needs an Internet access line to connect to the Internet.
(True/False)
4.8/5
(35)
If a flag field is not set, that means its value is ________.
(Multiple Choice)
4.9/5
(33)
A value of 1 in the ________ field indicates that the data field contains an ICMP message.
(Multiple Choice)
4.8/5
(38)
The TCP standard is difficult to attack because an attacker cannot send a false TCP message unless he or she can guess the sequence number of the next message.
(True/False)
4.9/5
(35)
Which of the following is NOT a popular transfer standard for e-mail?
(Multiple Choice)
4.8/5
(37)
When security is added to a standard, it usually is added only to later versions of the standard.
(True/False)
4.8/5
(40)
Showing 1 - 20 of 79
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)