Exam 12: Network Security
Exam 1: An Introduction to Networking50 Questions
Exam 2: Network Standards and the OSI Model50 Questions
Exam 3: Transmission Basics and Networking Media50 Questions
Exam 4: Introduction to TCP/IP Protocols50 Questions
Exam 5: Topologies and Ethernet Standards48 Questions
Exam 6: Network Hardware50 Questions
Exam 7: WANs and Remote Connectivity50 Questions
Exam 8: Wireless Networking50 Questions
Exam 9: Network Operating Systems50 Questions
Exam 10: In-Depth TCP/IP Networking50 Questions
Exam 11: Voice and Video Over IP50 Questions
Exam 12: Network Security50 Questions
Exam 13: Troubleshooting Network Problems50 Questions
Exam 14: Ensuring Integrity and Availability50 Questions
Exam 15: Network Management50 Questions
Select questions type
The combination of a public key and a private key is known as a ____.
(Multiple Choice)
4.8/5
(36)
In ____,both computers verify the credentials of the other.
(Multiple Choice)
4.7/5
(28)
An NOS that contains a "back door"is an example of a risk associated with ____.
(Multiple Choice)
4.9/5
(34)
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
(Multiple Choice)
4.8/5
(41)
In a ____ attack,a person redirects or captures secure transmissions as they occur.
(Multiple Choice)
4.8/5
(37)
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-Software that can only detect and log suspicious activity.
(Short Answer)
4.8/5
(31)
A security policy should state exactly which hardware,software,architecture,or protocols will be used to ensure security.
(True/False)
4.9/5
(37)
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-Data is encrypted using a single key.
(Short Answer)
4.7/5
(37)
Define SSH (secure shell)and explain threats it guards against.Include an explanation of the encryption algorithms that may be used with it.
(Essay)
4.9/5
(27)
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-The host that runs the proxy service.
(Short Answer)
4.8/5
(37)
Describe what distinguishes 802.1x from other authentication standards.
(Essay)
4.8/5
(28)
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-A firewall that can view a data stream.
(Short Answer)
4.7/5
(38)
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
(Multiple Choice)
4.8/5
(35)
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-Data is encrypted using two keys.
(Short Answer)
4.8/5
(33)
A(n)____________________ is a software application on a network host that acts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic.
(Short Answer)
4.9/5
(40)
In ____ ,a hacker forges name server records to falsify his host's identity.
(Multiple Choice)
4.9/5
(37)
A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.
(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)