Exam 4: Secure Networks
Exam 1: The Threat Environment69 Questions
Exam 2: Planning and Policy105 Questions
Exam 3: Cryptography101 Questions
Exam 4: Secure Networks81 Questions
Exam 5: Access Control63 Questions
Exam 6: Firewalls68 Questions
Exam 7: Host Hardening78 Questions
Exam 8: Application Security67 Questions
Exam 9: Data Protection69 Questions
Exam 10: Incident and Disaster Response67 Questions
Exam 11: Module a Networking Concepts79 Questions
Select questions type
The "death of the perimeter"
model has no distinct perimeter and there are multiple ways of entering the network.
Free
(True/False)
4.9/5
(27)
Correct Answer:
False
In an 802.1X standard, when a computer first connects, the port is in a(n) ________ state.
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
B
Which of the following is NOT accurate about wireless networks over wired networks?
Free
(Multiple Choice)
5.0/5
(37)
Correct Answer:
D
Using a central authentication server brings consistency in authentication.
(True/False)
4.8/5
(37)
Functionality and access control are two of the four goals to consider when securing networks.
(True/False)
4.7/5
(36)
A DoS attack begins when a ________ sends a signal for the bots to attack a victim.
(Multiple Choice)
4.8/5
(34)
All 802.11 wireless LAN standards use spread spectrum transmission.
(True/False)
5.0/5
(23)
Which of the following is NOT an advantage in using a central authentication server instead of each workgroup switch to do all the work?
(Multiple Choice)
4.7/5
(38)
Which of the following occurs when an attacker sends numerous TCP SYN segments to a victim server?
(Multiple Choice)
4.7/5
(28)
________ uses false ARP replies to map any IP address to any MAC address.
(Multiple Choice)
4.7/5
(29)
Ethernet switches can sense when a host connects to one of its ports.
(True/False)
4.7/5
(22)
Showing 1 - 20 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)