Exam 4: Secure Networks
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
ICMP can be best described as the second part of a three-way TCP handshake sent in response to a SYN.
(True/False)
5.0/5
(32)
Wireless 802.11 networks generally have a range of ________.
(Multiple Choice)
4.7/5
(34)
An indirect attack occurs when an attacker tries to flood a victim with a stream of packets directly from the attacker's computer.
(True/False)
4.7/5
(38)
In ________, users authenticate themselves to the access point via the use of a single, shared initial key.
(Multiple Choice)
4.8/5
(35)
"Breadth of the perimeter" is a phrase used by network administrators to convey that creating a 100% secure network is possible.
(True/False)
4.9/5
(29)
A ________ is an older attack that uses an illegally large IP packet to crash an operating system.
(Multiple Choice)
4.8/5
(26)
In addition to deauthenticate messages, an attacker could flood wireless clients with ________.
(Multiple Choice)
4.8/5
(30)
Rogue access points are authorized access points set up by individuals or departments.
(True/False)
4.8/5
(35)
After gaining wireless access to the private network, the attach can ________.
(Multiple Choice)
4.9/5
(34)
CTS frames tell other clients that you have received a RTS frame.
(True/False)
4.9/5
(37)
________ are an additional layer of compromised hosts that are used to manage large groups of bots.
(Multiple Choice)
4.9/5
(40)
Which of the following is a benefit of using a central authentication server in 802.1X?
(Multiple Choice)
4.8/5
(33)
Showing 101 - 119 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)