Exam 10: Introduction to Network Security
Exam 1: Introduction to Computer Networks41 Questions
Exam 2: Network Hardware Essentials41 Questions
Exam 3: Network Topologies and Technologies41 Questions
Exam 4: Network Media41 Questions
Exam 5: Network Protocols41 Questions
Exam 6: Network Reference Models and Standards39 Questions
Exam 7: Network Hardware in Depth41 Questions
Exam 8: Network Operating System Fundamentals40 Questions
Exam 9: Server Management and Administration40 Questions
Exam 10: Introduction to Network Security41 Questions
Exam 11: Supporting a Small Business Network41 Questions
Exam 12: Wide Area Network Essentials41 Questions
Exam 13: Troubleshooting and Support41 Questions
Select questions type
What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
B
What is a penetration tester?
Free
(Essay)
4.7/5
(37)
Correct Answer:
A penetration tester is a person who is skilled in the art of breaking into a network to find where the network is vulnerable for the purposes of advising a company on how to be more secure.
What is a policy that defines the methods involved when a user logs on to the network called?
(Multiple Choice)
4.8/5
(36)
____________ is a free open-source product that can be used to encrypt the contents of an entire drive.
(Short Answer)
4.9/5
(29)
Which of the following should not be a concern when discerning the level of security that is required in a network?
(Multiple Choice)
4.8/5
(33)
How the network resources are to be used should be clearly defined in a (an) ____________ policy.
(Short Answer)
4.8/5
(38)
Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.
(Essay)
4.7/5
(33)
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
(Multiple Choice)
4.9/5
(31)
Which of the following can be used to secure data on disk drives? (Choose all that apply.)
(Multiple Choice)
4.9/5
(25)
In Linux, passwords are stored in an encrypted format in the ____________ file, which is located in the /etc directory.
(Short Answer)
4.7/5
(38)
The ultimate goal of network security is to protect which of the following?
(Multiple Choice)
4.9/5
(39)
Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
(Multiple Choice)
4.8/5
(31)
The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
(Multiple Choice)
4.7/5
(44)
A security policy should clearly state the desired rules, even if they cannot be enforced..
(True/False)
4.9/5
(22)
Showing 1 - 20 of 41
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)