Exam 11: Securing Your Network
Exam 1: Networking: an Overview49 Questions
Exam 2: How Lan and Wan Communications Work52 Questions
Exam 3: Using Network Communication Protocols49 Questions
Exam 4: Connecting Through a Cabled Network47 Questions
Exam 5: Devices for Connecting Networks49 Questions
Exam 6: Connecting Through a Wireless Network49 Questions
Exam 7: Sharing Resources on a Network49 Questions
Exam 8: Using a Server49 Questions
Exam 9: Understanding Wan Connection Choices49 Questions
Exam 10: Basic Network Design49 Questions
Exam 11: Securing Your Network49 Questions
Exam 12: Maintaining and Troubleshooting Your Network49 Questions
Select questions type
Which type of attack refers to the use of human interaction to gain access to a system or to do damage.
(Multiple Choice)
4.9/5
(29)
A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.
(True/False)
4.9/5
(33)
Match each term with the correct statement below.
-software that reports back information-to an attacker or an advertiser,for example-about that computer user's activities.
(Multiple Choice)
5.0/5
(36)
A proxy can enhance performance through caching and filter communications.
(True/False)
4.9/5
(34)
Which of the following is used to interfere with normal access to network resources by flooding a network with useless information?
(Multiple Choice)
4.9/5
(31)
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.
(Multiple Choice)
4.8/5
(32)
A(n)____ is information that a Web server stores on a client computer,such as the client's preferences when accessing a particular Web site,or where the client has been on the Web site.
(Multiple Choice)
4.9/5
(36)
A DoS attack that floods a host with packets from many bogus source addresses is a form of ____________________.
(Short Answer)
4.7/5
(38)
Match each term with the correct statement below.
-used between network computers to verify the authenticity of the communication.
(Multiple Choice)
4.8/5
(35)
A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.
(Short Answer)
4.8/5
(40)
Provide a general description for how routers are used in border security.
(Essay)
4.8/5
(31)
Match each term with the correct statement below.
-a portion of a network that exists between two or more networks that have different security measures in place
(Multiple Choice)
4.8/5
(30)
Which protocol secures IP at the Network layer by using secure communications and encryptions standards?
(Multiple Choice)
4.8/5
(31)
Identify five border points that the strongest border security is designed to protect.
(Essay)
4.8/5
(35)
A set of filtering rules,called a ____,is applied to packets through the use of IPTables.
(Multiple Choice)
4.8/5
(39)
A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system,but does not create new files.
(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)