Exam 11: Network Management and Security
Exam 1: What Is a Computer Network30 Questions
Exam 2: Network Topology30 Questions
Exam 3: Networking Hardware30 Questions
Exam 4: Ethernet Technology30 Questions
Exam 5: Token-Ring, fddi, and Other LAN Technologies30 Questions
Exam 6: Network Design and Troubleshooting Scenarios30 Questions
Exam 7: Low-Level Protocols30 Questions
Exam 8: The Tcpip Protocols30 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols30 Questions
Exam 10: Switching and Routing30 Questions
Exam 11: Network Management and Security30 Questions
Exam 12: Electronic Mail30 Questions
Exam 13: FTP and Telnet30 Questions
Exam 14: Multimedia Networking30 Questions
Exam 15: The Internet30 Questions
Exam 16: Writing a Network Application30 Questions
Exam 17: An Introduction to Networking With Windows30 Questions
Exam 18: Windows Domains30 Questions
Exam 19: Unix and Linux30 Questions
Exam 20: Other Network Operating Systems30 Questions
Exam 21: Cryptography and Security30 Questions
Exam 22: Security Hardware30 Questions
Exam 23: Security Software30 Questions
Exam 24: Forensic Techniques30 Questions
Select questions type
Match each item with a statement below.
-Has no networking equipment or backup data,just electricity,space for equipment,and possibly bathrooms
(Multiple Choice)
4.9/5
(29)
A(n)____ is a stand-alone hardware unit that connects to the network or a software program running on a network host,collecting statistical information about the network performance.
(Multiple Choice)
4.8/5
(44)
____ is a technology where high-capacity file storage is directly connected to the network.
(Multiple Choice)
4.8/5
(33)
A denial-of-service attack (DOS attack)is characterized by an attempt to prevent legitimate users of a service from using that service.
(True/False)
4.7/5
(38)
Match each item with a statement below.
-Has all equipment required to maintain network communication and other services as well as current data
(Multiple Choice)
4.8/5
(35)
List five disaster recovery safeguards that can be used to help guarantee a relatively quick and painless recovery in the event that a disaster occurs.
(Essay)
4.9/5
(36)
A proxy-service firewall provides a combination of packet-filtering and proxy-service in one unit,requiring the most amount of inspection time per packet.
(True/False)
4.8/5
(34)
Network security begins with the security measures in place on the server.
(True/False)
4.9/5
(30)
Showing 21 - 30 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)