Exam 8: Administering a Secure Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Matching -​The ability to easily expand or contract resources in a virtualized environment.

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

F

Matching -A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack.​

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

List the steps in an 802.1x authentication procedure.

Free
(Essay)
4.8/5
(37)
Correct Answer:
Verified

If approved, the supplicant can now join the network and transmit data.

What is the term used for a device that requests permission from an authenticator to join a network?​

(Multiple Choice)
4.9/5
(35)

With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.

(Short Answer)
4.7/5
(41)

Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.

(Multiple Choice)
5.0/5
(38)

List the steps of a DNS lookup.

(Essay)
4.8/5
(34)

Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.

(True/False)
4.8/5
(36)

Why is the Physical Layer omitted in the TCP/IP model?

(Essay)
4.8/5
(37)

____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

(Short Answer)
4.8/5
(23)

Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?

(Multiple Choice)
4.8/5
(39)

List and describe the three service models of cloud computing.

(Essay)
4.9/5
(33)

Matching -​An older TCP/IP protocol and an application used for text-based commmunication

(Multiple Choice)
4.8/5
(31)

DNS poisoning can be prevented using the latest edition of what software below?

(Multiple Choice)
4.8/5
(30)

Matching -Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA)​

(Multiple Choice)
4.8/5
(41)

What are the two types of community strings?

(Essay)
4.9/5
(36)

What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?

(Multiple Choice)
4.9/5
(28)

At what level of the OSI model does the IP protocol function?

(Multiple Choice)
4.8/5
(39)

Matching -​Log that documents any unsuccessful events and the most significant successful events.

(Multiple Choice)
4.8/5
(23)

Matching -​A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)