Exam 4: Network Security
Exam 1: Core Network Concepts and Terminology68 Questions
Exam 2: Network Standards112 Questions
Exam 3: Network Management66 Questions
Exam 4: Network Security106 Questions
Exam 5: Ethernet 802.3switched Lans91 Questions
Exam 6: Wireless Lans I92 Questions
Exam 7: Wireless Lans II73 Questions
Exam 8: TCP/IP Internetworking I86 Questions
Exam 9: TCP/IP Internetworking II81 Questions
Exam 10: Carrier Wide Area Networks Wans81 Questions
Exam 11: Networked Applications84 Questions
Exam 12: Appendix: Managing the Security Process69 Questions
Select questions type
________ is the general name for malware on a user's PC that collects sensitive information and sends this information to an attacker.
(Multiple Choice)
4.7/5
(32)
Which type of firewall is more expensive per packet handled?
(Multiple Choice)
4.8/5
(37)
Which of the following attach themselves to other programs?
(Multiple Choice)
4.8/5
(27)
Fingerprint recognition is generally acceptable for ________.
(Multiple Choice)
4.8/5
(35)
If a packet is highly suspicious but not a provable attack packet,an ________ may drop it.
(Multiple Choice)
4.8/5
(35)
A debit card is secure because it requires two credentials for authentication-the card itself and a PIN.This is called ________.
(Multiple Choice)
4.9/5
(46)
Which type of firewall filtering collects streams of packets to analyze them as a group?
(Multiple Choice)
4.9/5
(34)
When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall,the firewall ________.
(Multiple Choice)
4.7/5
(34)
What kind of attack is most likely to succeed against a system with no technological vulnerabilities?
(Multiple Choice)
4.7/5
(41)
For consumers who suffered credit card fraud because of the Target breach and acted quickly,which of the following is true?
(Multiple Choice)
4.8/5
(41)
In SPI firewalls,ACLs are used for packets in the ________ state.
(Multiple Choice)
4.9/5
(36)
You click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see.You exit without looking around.is that hacking?
(Multiple Choice)
4.9/5
(38)
You accidentally discover that you can get into other e-mail accounts after you have logged in under your account and only spend a few minutes looking at another user's mail.Is that hacking?
(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 106
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)