Exam 11: Securing Your Network
Exam 1: Networking: an Overview49 Questions
Exam 2: How Lan and Wan Communications Work52 Questions
Exam 3: Using Network Communication Protocols49 Questions
Exam 4: Connecting Through a Cabled Network47 Questions
Exam 5: Devices for Connecting Networks49 Questions
Exam 6: Connecting Through a Wireless Network49 Questions
Exam 7: Sharing Resources on a Network49 Questions
Exam 8: Using a Server49 Questions
Exam 9: Understanding Wan Connection Choices49 Questions
Exam 10: Basic Network Design49 Questions
Exam 11: Securing Your Network49 Questions
Exam 12: Maintaining and Troubleshooting Your Network49 Questions
Select questions type
Which technology discourages attackers because they cannot identify a specific computer to attack on the internal network?
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
B
Which of the following is a program that appears useful,but instead does harm to a user's computer?
Free
(Multiple Choice)
5.0/5
(45)
Correct Answer:
C
The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
C
Which of the following are criteria upon which a router can make filtering decisions? (Choose all that apply.)
(Multiple Choice)
4.8/5
(34)
One step in hardening a system involves deploying all available services on your system,thereby confusing a potential attacker.
(True/False)
4.9/5
(40)
____ is unrequested e-mail that is sent to hundreds,thousands,or even millions of users.
(Multiple Choice)
4.8/5
(36)
Match each term with the correct statement below.
-command line interface that enables you to configure packet filter rules through the use of tables.
(Multiple Choice)
4.9/5
(43)
Which of the following are steps to keep in mind when hardening a system? (Choose all that apply.)
(Multiple Choice)
4.9/5
(33)
Stateless filtering screens on the basis of the context of the communication.
(True/False)
4.8/5
(34)
Which of the following is a portion of a network that exists between two or more networks such as a network between a private network and the Internet?
(Multiple Choice)
4.8/5
(33)
A router can perform packet filtering and can be used as a firewall on a network.
(True/False)
4.8/5
(32)
Match each term with the correct statement below.
-provides information about all kinds of security threats.
(Multiple Choice)
4.8/5
(31)
A ____________________ is not a virus,but an e-mail falsely warning of a virus.
(Short Answer)
4.7/5
(46)
It is best to secure your wireless network in order to prevent which of the following types of attacks that involve the attacker using a portable computer and an omnidirectional antenna?
(Multiple Choice)
4.9/5
(44)
Which of the following are border points that should be protected with a strong border security design? (Choose all that apply.)
(Multiple Choice)
4.8/5
(33)
Match each term with the correct statement below.
-might take the form of simply flooding a system with more packets than it can handle.
(Multiple Choice)
5.0/5
(38)
Match each term with the correct statement below.
-used by attackers to associate IP address information with account and password communications.
(Multiple Choice)
5.0/5
(35)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)