Exam 12: Network Security
Exam 1: An Introduction to Networking50 Questions
Exam 2: Network Standards and the OSI Model50 Questions
Exam 3: Transmission Basics and Networking Media50 Questions
Exam 4: Introduction to TCP/IP Protocols50 Questions
Exam 5: Topologies and Ethernet Standards48 Questions
Exam 6: Network Hardware50 Questions
Exam 7: WANs and Remote Connectivity50 Questions
Exam 8: Wireless Networking50 Questions
Exam 9: Network Operating Systems50 Questions
Exam 10: In-Depth TCP/IP Networking50 Questions
Exam 11: Voice and Video Over IP50 Questions
Exam 12: Network Security50 Questions
Exam 13: Troubleshooting Network Problems50 Questions
Exam 14: Ensuring Integrity and Availability50 Questions
Exam 15: Network Management50 Questions
Select questions type
Describe one potential flaw in CHAP and MS-CHAP authentication and explain how it is resolved.
(Essay)
4.7/5
(30)
The use of certificate authorities to associate public keys with certain users is known as ____.
(Multiple Choice)
4.8/5
(30)
MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-Software that can react to suspicious activity.
(Short Answer)
4.8/5
(34)
A(n)____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
(Short Answer)
4.9/5
(30)
A ____ attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
(Multiple Choice)
4.8/5
(49)
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
(Multiple Choice)
4.8/5
(31)
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
(Multiple Choice)
4.8/5
(40)
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.
(Multiple Choice)
4.8/5
(38)
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
(Multiple Choice)
4.9/5
(38)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)