Exam 8: Network Risk Management
Exam 1: Introduction to Networking50 Questions
Exam 2: How Computers Find Each Other on Networks49 Questions
Exam 3: How Data Is Transported Over Networks50 Questions
Exam 4: Structured Cabling and Networking Elements50 Questions
Exam 5: Network Cabling50 Questions
Exam 6: Wireless Networking50 Questions
Exam 7: Cloud Computing and Remote Access50 Questions
Exam 8: Network Risk Management50 Questions
Exam 9: Unified Communications and Network Performance Management50 Questions
Exam 10: Network Segmentation and Virtualization50 Questions
Exam 11: Wide Area Networks50 Questions
Exam 12: Industrial and Enterprise Networking50 Questions
Select questions type
What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size,and internal instructions)to avoid detection?
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
C
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
A
Matching
Match each correct item with the statement below.
-A program that runs independently and travelsbetween computers and across networks.Although wormsdo not alter other programs as viruses do,they can carryviruses.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
J
What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge or consent?
(Multiple Choice)
4.8/5
(29)
Matching
Match each correct item with the statement below.
-A specification created by the NSA to define protectionstandards against RF emanation,which when implementedare called EmSec (emission security).
(Multiple Choice)
4.7/5
(42)
If multiple honeypots are connected to form a larger network,what term is used to describe the network?
(Multiple Choice)
4.9/5
(36)
Describe some of the characteristics of malware that make it difficult to detect.
(Essay)
4.8/5
(35)
A reflective attack can be increased in intensity by combining it with what type of attack?
(Multiple Choice)
4.9/5
(34)
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?
(Multiple Choice)
4.7/5
(29)
The ________________ utility is a Windows console that is used to control what users do and how the system can be used.
(Short Answer)
4.8/5
(32)
Different types of organizations have similar levels of network security risks.
(True/False)
4.9/5
(28)
What type of virus are dormant until a specific condition is met,such as the changing of a file or a match of the current date?
(Multiple Choice)
4.8/5
(32)
Which software below serves as the firewall for Linux systems?
(Multiple Choice)
4.8/5
(34)
Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers?
(Multiple Choice)
4.9/5
(35)
Matching
Match each correct item with the statement below.
-A type ofintrusion detection that runs on a single computer,such as aclient or server,to alert about attacks against that one host.
(Multiple Choice)
4.9/5
(33)
Matching
Match each correct item with the statement below.
-A portion of the security policythat explains to users what they can and cannot do,andpenalties for violations.It might also describe how thesemeasures protect the network's security.
(Multiple Choice)
4.9/5
(35)
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?
(Multiple Choice)
4.8/5
(43)
Matching
Match each correct item with the statement below.
-A type ofintrusion prevention that runs on a single computer,such as aclient or server,to intercept and help prevent attacks againstthat one host.
(Multiple Choice)
4.7/5
(30)
A system that is capable of collecting and analyzing information generated by firewalls,IDS,and IPS systems is known as which term below?
(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)