Exam 9: Network Fundamentals
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Networks without any architecture are considered to be poor.
Free
(True/False)
4.8/5
(30)
Correct Answer:
False
Which of the following is not a private IP address?
Free
(Multiple Choice)
4.7/5
(50)
Correct Answer:
B
What is the difference between TCP and UDP
Free
(Essay)
4.8/5
(26)
Correct Answer:
UDP is known as a "connectionless" protocol,as it has very few error-recovery services and no guarantee of packet delivery.UDP is considered to be an unreliable protocol and is often only used for network services that are not greatly affected by the occasional lost or dropped packet.TCP is a "connection oriented" protocol,and was specifically designed to provide a reliable connection between two hosts exchanging data.As part of the TCP protocol,each packet has a sequence number to show where that packet fits into the overall conversation.With the sequence numbers,packets can arrive in any order and at different times and the receiving system will still know the correct order for processing them.
A DMZ acts as a buffer zone between the Internet,where no controls exist,and the inner,secure network,where an organization has security policies in place.
(True/False)
4.9/5
(37)
All the network components are connected to a central point in which topology?
(Multiple Choice)
4.7/5
(32)
_______________ translates private (nonroutable)IP addresses into public (routable)IP addresses.
(Short Answer)
4.8/5
(25)
What is called when network components are connected to each other in a closed loop,with each device directly connected to two other devices.
(Multiple Choice)
4.8/5
(28)
Packet delivery to distant systems is usually accomplished by the use of
(Multiple Choice)
4.7/5
(30)
Local packet delivery (where packets are delivered on a LAN)uses ________ addresses to send packets.
(Short Answer)
4.8/5
(37)
Which of the following is a benefit that Network Address Translation (NAT)provides
(Multiple Choice)
4.8/5
(33)
Address Resolution Protocol resolves a MAC address to an IP address.
(True/False)
4.7/5
(37)
The process of spanning a single VLAN across multiple switches is called _______________.
(Short Answer)
4.8/5
(28)
An agreed upon format for exchanging or transmitting data between systems is called a(n)_______________.
(Short Answer)
4.8/5
(31)
_______________ is the protocol used to resolve an IP address to a MAC address.
(Short Answer)
4.8/5
(35)
A network that lies completely inside a trusted area of a network,and is under the security control of the system and network administrators,is referred to as the
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 55
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)