Exam 4: Secure Networks
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
________ is the process of obscuring an attackers source IP address.
(Multiple Choice)
4.8/5
(31)
One problem with ARP requests and replies is that they do not require authentication of verification.
(True/False)
4.9/5
(37)
WLAN DoS attacks are designed to affect the ________ of the network.
(Multiple Choice)
4.9/5
(35)
Once established, botnets can be leased to other criminals for DoS attacks.
(True/False)
4.8/5
(39)
In a P2P attack, there is a change in traffic pattern but the overall volume of traffic is the same.
(True/False)
4.8/5
(36)
In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The servers then send all responses to the victim.
(True/False)
4.7/5
(32)
________ is one method of thwarting DoS attacks by dropping all IP packets from an attacker.
(Multiple Choice)
5.0/5
(33)
A firewall does note set aside resources for a connection when a SYN segment arrives, so handling a large number of false SYN segments is only a small burden.
(True/False)
4.9/5
(33)
When a new EAP authentication is added, software does not have to be changed on the ________.
(Multiple Choice)
4.9/5
(34)
________ security uses the RC4 cipher in encryption for confidentiality and the Temporal Key Integrity Protocol for keying and rekeying.
(Multiple Choice)
5.0/5
(36)
WEP encrypts each frame with a per-frame key that consists of the shared RC4 key plus a 24-bit initialization vector that is different for each frame.
(True/False)
4.8/5
(40)
Showing 41 - 60 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)