Exam 7: Administering a Secure Network
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply. )
Free
(Multiple Choice)
4.7/5
(49)
Correct Answer:
A,D
DNS poisoning can be prevented using the latest edition of what software below?
Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
A
S/MIME can be used when mail is accessed through a web browser.
Free
(True/False)
4.9/5
(35)
Correct Answer:
False
Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?
(Multiple Choice)
4.7/5
(39)
Trivial File Transfer Protocol (TFTP)uses a more memory when compared to FTP.
(True/False)
4.8/5
(45)
When using SNMPv1 or SNMPv2,what piece of information is needed to view information from an agent?
(Multiple Choice)
4.9/5
(29)
A DDoS mitigator is a software device that identifies and blocks real-time distributed denial of service (DDoS)attacks.
(True/False)
4.8/5
(43)
What hardware device can be inserted into a network to allow an administrator to monitor traffic?
(Multiple Choice)
4.7/5
(32)
What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?
(Multiple Choice)
5.0/5
(38)
What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?
(Multiple Choice)
4.9/5
(29)
SNMP-managed devices must have an agent or a service that listens for commands and then executes them.
(True/False)
4.8/5
(37)
TCP/IP uses its own four-layer architecture that includes the Network Interface,Internet,Transport,and Application layers.
(True/False)
4.8/5
(36)
At what level of the OSI model does the IP protocol function?
(Multiple Choice)
4.8/5
(39)
Discuss at least two security advantages of a host running virtualization.
(Essay)
4.8/5
(34)
The most popular implementation of DNS is the Unix Internet Name Domain.
(True/False)
4.8/5
(29)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)