Exam 13: Network Protection Systems
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
A security appliance is a single device combining two or more network protection functions.
Free
(True/False)
4.8/5
(32)
Correct Answer:
True
____ monitor network devices so that security administrators can identify attacks in progress and stop them.
Free
(Multiple Choice)
4.8/5
(20)
Correct Answer:
D
A honeypot appears to have important data or sensitive information stored on it.
Free
(True/False)
5.0/5
(28)
Correct Answer:
True
To see the contents of flash memory and the amount of memory used and available, a Cisco administrator would type this command: ____.
(Multiple Choice)
4.8/5
(41)
MATCHING
Match each term with the correct statement below.
-internal private IP addresses are mapped to public external IP addresses
(Multiple Choice)
4.8/5
(29)
MATCHING
Match each term with the correct statement below.
-handles each packet on an individual basis and are not resistant to spoofing or DoS attacks
(Multiple Choice)
4.7/5
(31)
The ____ of a Cisco router holds the IOS the router is using.
(Multiple Choice)
4.8/5
(35)
MATCHING
Match each term with the correct statement below.
-serves two purposes: controlling access to all traffic that enters an internal network, and controlling all traffic that leaves an internal network
(Multiple Choice)
4.9/5
(30)
One goal of a(n) ____ is to have hackers connect to the "phony" computer long enough to be traced.
(Multiple Choice)
4.9/5
(40)
A(n) ____________________ is a computer placed on the perimeter of a network that contains information or data intended to lure and then trap hackers.
(Short Answer)
4.8/5
(33)
MATCHING
Match each term with the correct statement below.
-replaced the Cisco PIX firewall and added advanced modular features
(Multiple Choice)
4.9/5
(39)
A(n) ____ sits between the Internet and the internal network and is sometimes referred to as a "perimeter network."
(Multiple Choice)
4.8/5
(35)
Stateless packet filters recognize types of anomalies that most routers ignore, such as hundreds or thousands of SYN/ACK packets being sent to a computer or server, even though the computer or server hasn't sent out any SYN packets
(True/False)
4.8/5
(31)
____________________ honeypots are created by using a programming language rather than configuring a physical device.
(Short Answer)
4.8/5
(32)
____, written in C for *nix platforms, is an open-source virtual honeypot created and maintained by Niels Provos.
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)