Exam 3: Network Security
Exam 1: Welcome to the Cloud92 Questions
Exam 2: Network Standards100 Questions
Exam 3: Network Security152 Questions
Exam 4: Network Management96 Questions
Exam 5: Wired Ethernet Lans117 Questions
Exam 6: Wireless Lans I97 Questions
Exam 7: Wireless Lans 275 Questions
Exam 8: Tcpip Internetworking I96 Questions
Exam 9: Tcpip Internetworking 2104 Questions
Exam 10: Wide Area Networks84 Questions
Exam 11: Networked Applications95 Questions
Exam 12: Module a More on Tcp4 Questions
Exam 13: Module B More on Modulation12 Questions
Exam 14: Module C More on Telecommunications47 Questions
Exam 15: Module D Directory Servers11 Questions
Select questions type
What are the most dangerous types of employees?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
C
A program that can capture passwords as you enter them is ________.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
A
The password R7%t& is adequately strong.
Free
(True/False)
4.7/5
(45)
Correct Answer:
False
A password that can be broken by a dictionary attack or a dictionary attack in hybrid mode can be adequately strong if it is very long.
(True/False)
4.8/5
(41)
Which of the following sometimes uses direct propagation between computers?
(Multiple Choice)
4.8/5
(37)
According to the book,passwords should be at least ________ characters long.
(Multiple Choice)
4.8/5
(31)
What does a hacker usually do IMMEDIATELY after downloading a hacker toolkit?
(Multiple Choice)
4.8/5
(45)
The password 7u3aB& can be defeated most quickly by a ________.
(Multiple Choice)
4.9/5
(39)
ASIC technology has been critical to the development of ________.
(Multiple Choice)
4.9/5
(27)
Two-factor authentication usually will work even if the attacker can intercept all authentication communication.
(True/False)
4.7/5
(39)
Two-factor authentication usually will work even if the attacker controls the supplicant's computer.
(True/False)
4.8/5
(40)
Policies are separated by implementation to take advantage of ________.
(Multiple Choice)
4.8/5
(36)
The generic name for a security flaw in a program is a ________.
(Multiple Choice)
4.7/5
(30)
Methods that hackers use to break into computers are ________.
(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 152
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)