Exam 11: Network Management and Security
Exam 1: What Is a Computer Network30 Questions
Exam 2: Network Topology30 Questions
Exam 3: Networking Hardware30 Questions
Exam 4: Ethernet Technology30 Questions
Exam 5: Token-Ring, fddi, and Other LAN Technologies30 Questions
Exam 6: Network Design and Troubleshooting Scenarios30 Questions
Exam 7: Low-Level Protocols30 Questions
Exam 8: The Tcpip Protocols30 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols30 Questions
Exam 10: Switching and Routing30 Questions
Exam 11: Network Management and Security30 Questions
Exam 12: Electronic Mail30 Questions
Exam 13: FTP and Telnet30 Questions
Exam 14: Multimedia Networking30 Questions
Exam 15: The Internet30 Questions
Exam 16: Writing a Network Application30 Questions
Exam 17: An Introduction to Networking With Windows30 Questions
Exam 18: Windows Domains30 Questions
Exam 19: Unix and Linux30 Questions
Exam 20: Other Network Operating Systems30 Questions
Exam 21: Cryptography and Security30 Questions
Exam 22: Security Hardware30 Questions
Exam 23: Security Software30 Questions
Exam 24: Forensic Techniques30 Questions
Select questions type
____ hardening involves disabling non-essential protocols and services,installing up-to-date service packs,patches,and hotfixes,and properly establishing access control permissions.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
D
A ____ uses a special switch (typically utilizing Fibre Channel technology)to connect servers and storage devices on their own physical network.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
List and describe the different types of hardening.
Free
(Essay)
4.8/5
(31)
Correct Answer:
Hardening is a process where the vulnerabilities to a system or process are reduced or eliminated.There are three areas to concentrate on: network hardening,operating system hardening,and application hardening.Network hardening involves the use of routers,firewalls,IDS systems,and fault tolerance to help provide a protected and highly-available network.Operating system hardening involves disabling non-essential protocols and services,installing up-to-date service packs,patches,and hotfixes,and properly establishing access control permissions.Application hardening involves updating or patching applications as required,as well as properly administering usernames and passwords (changing default usernames and passwords).
Network management is one of the most important tasks that is performed in a networked computer environment.
(True/False)
4.9/5
(35)
A(n)____ combines traffic sniffing with analysis techniques.
(Multiple Choice)
4.8/5
(38)
____________________ is a security measure that uses the public network infrastructure,such as the Internet,as part of a Virtual Private Network.
(Short Answer)
4.9/5
(42)
A ____ is a partitioning of the ports on a VLAN-capable switch into LAN groups whose traffic is isolated from each other.
(Multiple Choice)
4.7/5
(39)
A(n)____________________ device is a network device that you can manage via a network connection,either through an ordinary browser or through special management software that comes with the device.
(Short Answer)
4.8/5
(31)
A ____ looks at the long-term operation of the business,so a business should develop two plans.
(Multiple Choice)
4.9/5
(31)
Match each item with a statement below.
-Has the minimal networking hardware required to maintain network communication,but requires restoration from the most recent backup to become operational
(Multiple Choice)
5.0/5
(39)
____________________ hardening involves updating or patching applications as required,as well as properly administering usernames and passwords (changing default usernames and passwords).
(Short Answer)
4.9/5
(27)
Match each item with a statement below.
-Includes planning and methodologies designed to reduce or eliminate threats
(Multiple Choice)
4.8/5
(33)
A(n)____________________ is a program that replicates itself,but does not necessarily infect other programs.
(Short Answer)
4.7/5
(31)
The ____ module converts the server's keyboard,video,and mouse signals for transport over Cat 5 UTP cable and provides interfacing for USB and PS/2 mice.
(Multiple Choice)
4.8/5
(26)
____ hardening involves the use of routers,firewalls,IDS systems,and fault tolerance to help provide a protected and highly-available network.
(Multiple Choice)
4.8/5
(40)
A(n)____________________ allows you to connect the keyboard,video,and mouse signals from two or more computers to a single keyboard,video monitor,and mouse.
(Short Answer)
4.8/5
(38)
A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.
(Multiple Choice)
4.8/5
(29)
Match each item with a statement below.
-Includes the methods used to regulate what packets are transmitted
(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)