Exam 4: Secure Networks
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
In a P2P attack, there is a change in the overall volume of traffic but the traffic pattern is the same.
(True/False)
4.8/5
(30)
The original 802.11 core security protocol, ________, was deeply flawed.
(Multiple Choice)
4.9/5
(36)
In normal ARP traffic, generally an attacker on the same network cannot see traffic between two hosts.
(True/False)
4.8/5
(41)
Most central authentication servers are governed by the ________ standard.
(Multiple Choice)
4.8/5
(35)
Focusing electronic attacks on specific high-value targets is known as whaling.
(True/False)
4.8/5
(40)
Rerouting traffic using ARP poisoning is an attack on ________ of a network.
(Multiple Choice)
4.8/5
(43)
Secure wireless networks can be legally accessed by anyone and are frequently posted as such.
(True/False)
4.8/5
(32)
ARP is used to resolve 48-bit IP addresses into 32-bit local MAC addresses.
(True/False)
4.8/5
(40)
The most common attack against a wireless network is a wireless DoS attack.
(True/False)
4.9/5
(36)
Ensuring appropriate network ________ means preventing attackers from altering the capabilities or operation of the network.
(Multiple Choice)
4.7/5
(33)
In regards to network security, ________ is the policy-driven control of access to systems, data, and dialogues.
(Multiple Choice)
4.9/5
(32)
SYN-ACK can be best described as the second part of a three-way TCP handshake sent in response to a SYN.
(True/False)
4.9/5
(38)
RTS frames tell other wireless clients that you want to transmit for a given amount of time.
(True/False)
4.8/5
(32)
A DoS attack makes a server or network unavailable by flooding it with attack packets.
(True/False)
4.7/5
(38)
Showing 61 - 80 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)