Exam 9: Network Fundamentals
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
_______________ describes network components that are connected to the same cable,often called "the backbone."
(Short Answer)
4.8/5
(36)
All of the following are advantages of TCP over UDP EXCEPT:
(Multiple Choice)
4.8/5
(30)
Network components connected to the same cable are often called "the backbone" in which topology?
(Multiple Choice)
4.8/5
(38)
Which of the following improves the security of the network by hiding internal addresses?
(Multiple Choice)
5.0/5
(36)
_______________ is the protocol that resolves a domain name to an IP address.
(Short Answer)
4.8/5
(32)
A ________ is a network typically smaller in terms of size and geographic coverage and consist of two or more connected devices.Home or office networks are typically classified as this type of network.
(Multiple Choice)
4.7/5
(38)
A network can logically appear as one topology,but physically match a different topology.
(True/False)
4.8/5
(42)
NAT translates private (nonroutable)IP addresses into public (routable)IP addresses.
(True/False)
4.9/5
(29)
Which protocol is based on transferring data in fixed-size packets? (The fixed packet sizes help ensure that no single data type monopolizes the available bandwidth. )
(Multiple Choice)
4.9/5
(30)
The method of packaging packets so that they can traverse a network in a secure manner is called _______________.
(Short Answer)
5.0/5
(36)
Packets delivered to a network,such as an office LAN,are usually sent using the destination system's
(Multiple Choice)
4.9/5
(28)
Showing 41 - 55 of 55
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)