Exam 6: Network Security Devices, Design, and Technology
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
All modern operating systems include a hardware firewall,usually called a host-based firewall.
Free
(True/False)
4.7/5
(30)
Correct Answer:
False
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
A
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
Free
(True/False)
4.9/5
(34)
Correct Answer:
True
When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet,what technology is being used?
(Multiple Choice)
4.8/5
(29)
Which of the following is a software-based application that runs on a local host computer that can detect an attack as?it occurs?
(Multiple Choice)
4.7/5
(45)
Which of the following is a system of security tools that are used to recognize and identify data that is critical to the organization and ensure that it is protected?
(Multiple Choice)
4.8/5
(25)
An administrator has two servers that host the same web content,but only one server is utilized at a given time.What can be configured that can help to evenly distribute work across the network,and make use of both servers in a manner that is transparent to the end users?
(Multiple Choice)
4.8/5
(41)
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
(Multiple Choice)
4.9/5
(43)
What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS?processing?
(Multiple Choice)
4.7/5
(29)
If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?
(Multiple Choice)
5.0/5
(33)
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?
(Multiple Choice)
4.9/5
(33)
What is the difference between anomaly based monitoring and signature based monitoring?
(Essay)
5.0/5
(40)
How does a Unified Threat Management (UTM)security product help reduce administrative overhead?
(Essay)
4.7/5
(41)
The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches.How can this be done?
(Multiple Choice)
4.8/5
(40)
What kind of networking device forwards packets across different computer networks by reading destination addresses?
(Multiple Choice)
4.8/5
(38)
What data unit is associated with the Open Systems Interconnection layer four?
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)