Exam 7: Administering a Secure Network
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
An administrator needs to examine FTP commands that are being passed to a server.What port should the administrator be monitoring?
(Multiple Choice)
4.7/5
(41)
Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?
(Multiple Choice)
4.8/5
(32)
On and SDN network,what specific unit gives traffic the permission to flow through the network?
(Multiple Choice)
4.9/5
(35)
Discuss the Infrastructure as a Service (IaaS)model used in cloud computing.
(Essay)
4.8/5
(32)
A private cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.
(True/False)
4.9/5
(31)
What Microsoft Windows feature prevents attackers from using buffer overflows to execute malware?
(Short Answer)
4.8/5
(35)
Which of the following is the process of running a user desktop inside a virtual machine that resides on a server?
(Multiple Choice)
4.8/5
(33)
File integrity check (FIC)is a service that can monitor any changes made to computer files,such as operating system files.
(True/False)
4.8/5
(44)
Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
(Multiple Choice)
4.9/5
(28)
What specific issues are associated with log management? (Choose all that apply. )
(Multiple Choice)
4.8/5
(32)
Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?
(Multiple Choice)
4.9/5
(29)
A correlation engine aggregates and correlates content from different sources to uncover an attack.
(True/False)
4.8/5
(36)
Explain the basic operating principals used in software defined networking.
(Essay)
4.8/5
(33)
If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch,what switch technology will need to be supported?
(Multiple Choice)
4.9/5
(31)
How can a network of physical devices be grouped into logical units,regardless of what network switches they may be connected to?
(Multiple Choice)
4.8/5
(33)
What secure protocol is recommended for Network address translation?
(Multiple Choice)
4.9/5
(40)
What device operates at the Network Layer (layer 3)of the OSI model and forwards packets across computer networks?
(Multiple Choice)
4.9/5
(39)
What type of switch is used to combine multiple network connections into a single link?
(Multiple Choice)
4.8/5
(39)
In what type of cloud computing does the customer have some control over the operating systems,storage,and their installed applications?
(Multiple Choice)
4.9/5
(27)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)