Exam 10: Introduction to Network Security
Exam 1: Introduction to Computer Networks41 Questions
Exam 2: Network Hardware Essentials41 Questions
Exam 3: Network Topologies and Technologies41 Questions
Exam 4: Network Media41 Questions
Exam 5: Network Protocols41 Questions
Exam 6: Network Reference Models and Standards39 Questions
Exam 7: Network Hardware in Depth41 Questions
Exam 8: Network Operating System Fundamentals40 Questions
Exam 9: Server Management and Administration40 Questions
Exam 10: Introduction to Network Security41 Questions
Exam 11: Supporting a Small Business Network41 Questions
Exam 12: Wide Area Network Essentials41 Questions
Exam 13: Troubleshooting and Support41 Questions
Select questions type
Which protocol is used to encrypt data as it travels a network?
(Multiple Choice)
4.8/5
(28)
____________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
(Short Answer)
4.7/5
(30)
Firewall rules can be based on which of the following properties? (Choose all that apply.)
(Multiple Choice)
4.7/5
(36)
You don't need to physically secure your servers as long as you use a good strong password for your accounts.
(True/False)
4.9/5
(34)
When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
(Multiple Choice)
4.8/5
(25)
A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
(True/False)
4.9/5
(34)
What are the complexity requirements for a Windows password? List the four characteristics.
(Essay)
4.8/5
(36)
A(an) ____________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect.
(Short Answer)
4.8/5
(29)
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
(Multiple Choice)
4.8/5
(32)
In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.
(True/False)
4.9/5
(36)
If the minimum password length on a Windows system is set to zero, what does that mean?
(Multiple Choice)
5.0/5
(36)
If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
(Multiple Choice)
4.8/5
(36)
A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.
(True/False)
4.9/5
(37)
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
(Multiple Choice)
4.9/5
(32)
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
(Multiple Choice)
4.9/5
(40)
Which VPN implementation needs no additional configuration to be allowed access through a firewall?
(Multiple Choice)
4.8/5
(31)
In Windows 7, what is the maximum length that a password can be?
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 41
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)