Exam 7: Administering a Secure Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply. )

Free
(Multiple Choice)
4.7/5
(49)
Correct Answer:
Verified

A,D

DNS poisoning can be prevented using the latest edition of what software below?

Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
Verified

A

S/MIME can be used when mail is accessed through a web browser.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

False

Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?

(Multiple Choice)
4.7/5
(39)

Trivial File Transfer Protocol (TFTP)uses a more memory when compared to FTP.

(True/False)
4.8/5
(45)

When using SNMPv1 or SNMPv2,what piece of information is needed to view information from an agent?

(Multiple Choice)
4.9/5
(29)

A DDoS mitigator is a software device that identifies and blocks real-time distributed denial of service (DDoS)attacks.

(True/False)
4.8/5
(43)

Describe the ways you can use FTP on a local host computer.

(Essay)
4.9/5
(33)

What hardware device can be inserted into a network to allow an administrator to monitor traffic?

(Multiple Choice)
4.7/5
(32)

What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?

(Multiple Choice)
5.0/5
(38)

What secure protocol is recommended for voice and video?

(Multiple Choice)
5.0/5
(31)

What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?

(Multiple Choice)
4.9/5
(29)

SNMP-managed devices must have an agent or a service that listens for commands and then executes them.

(True/False)
4.8/5
(37)

TCP/IP uses its own four-layer architecture that includes the Network Interface,Internet,Transport,and Application layers.

(True/False)
4.8/5
(36)

At what level of the OSI model does the IP protocol function?

(Multiple Choice)
4.8/5
(39)

Why is the Physical Layer omitted in the TCP/IP model?

(Essay)
4.8/5
(31)

Discuss at least two security advantages of a host running virtualization.

(Essay)
4.8/5
(34)

The most popular implementation of DNS is the Unix Internet Name Domain.

(True/False)
4.8/5
(29)

List the steps of a DNS lookup.

(Essay)
4.8/5
(34)

Which of the following protocols is unsecured?

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)