Exam 8: Administering a Secure Network
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Matching
-The ability to easily expand or contract resources in a virtualized environment.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
F
Matching
-A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
D
List the steps in an 802.1x authentication procedure.
Free
(Essay)
4.8/5
(37)
Correct Answer:
If approved, the supplicant can now join the network and transmit data.
What is the term used for a device that requests permission from an authenticator to join a network?
(Multiple Choice)
4.9/5
(35)
With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.
(Short Answer)
4.7/5
(41)
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
(Multiple Choice)
5.0/5
(38)
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
(True/False)
4.8/5
(36)
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
(Short Answer)
4.8/5
(23)
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?
(Multiple Choice)
4.8/5
(39)
Matching
-An older TCP/IP protocol and an application used for text-based commmunication
(Multiple Choice)
4.8/5
(31)
DNS poisoning can be prevented using the latest edition of what software below?
(Multiple Choice)
4.8/5
(30)
Matching
-Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA)
(Multiple Choice)
4.8/5
(41)
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
(Multiple Choice)
4.9/5
(28)
At what level of the OSI model does the IP protocol function?
(Multiple Choice)
4.8/5
(39)
Matching
-Log that documents any unsuccessful events and the most significant successful events.
(Multiple Choice)
4.8/5
(23)
Matching
-A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)