Exam 10: Infrastructure Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ media store data through the rearrangement of magnetic particles on a nonmagnetic substrate

(Multiple Choice)
4.8/5
(38)

The most common implementation of VPN is via IPsec

(True/False)
4.8/5
(37)

You are building a small network in the office.You will need to connect two different network segments that have different network addresses.What device will you use connect them?

(Multiple Choice)
4.7/5
(32)

_______ are characterized by the use of a laser to read data stored on a physical device.

(Multiple Choice)
4.7/5
(31)

You are building a network and need to connect five computers in an office.They will be on the same network segment and you should be able to perform some security functions such as port address security.What device would you use to connect the computers?

(Multiple Choice)
4.8/5
(26)

The rules that define what traffic is permissible and what traffic is to be blocked or denied are called _______________.

(Short Answer)
4.8/5
(34)

Worms are software that attaches itself to a file and then executes on a machine.

(True/False)
4.8/5
(31)

Infrared works like wireless in that it can penetrate walls.

(True/False)
4.8/5
(44)

A(n)_________ is a network device that can be hardware,software,or a combination of both whose purpose is to enforce a security policy across its connections to external networks such as the Internet

(Multiple Choice)
4.7/5
(29)

_______________ are devices designed to detect,log,and respond to unauthorized network or host use,both in real time and after the fact.

(Short Answer)
4.8/5
(38)

The following are steps in securing a workstation EXCEPT:

(Multiple Choice)
4.8/5
(49)

Managing the endpoints on a case-by-case basis as they connect is a security methodology known as _______________.

(Short Answer)
4.9/5
(33)

Multiple operating systems can be operated concurrently on the same hardware using _______________.

(Short Answer)
5.0/5
(38)

The machine that sits on a desktop and is used for sending and reading everyday e-mail,creating reports,or playing games is called the _______________.

(Short Answer)
4.7/5
(38)

Which of the following is an extension of the public telephone network into a business?

(Multiple Choice)
4.9/5
(32)

What protocol is used to manage IP address space?

(Multiple Choice)
4.8/5
(38)

Preventing physical access to a server by an unauthorized individual is the

(Multiple Choice)
4.9/5
(32)

________ are types of magnetic media.

(Multiple Choice)
4.8/5
(44)

Category 5 cable is rated for 10-Mbps Ethernet.

(True/False)
4.9/5
(43)

A virtual private network (VPN)is a construct used to provide

(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)