Exam 8: Administering a Secure Network
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?
(Multiple Choice)
4.8/5
(30)
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?
(Multiple Choice)
4.8/5
(33)
Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?
(Multiple Choice)
4.9/5
(24)
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?
(Multiple Choice)
4.8/5
(38)
Broadcast storms can be prevented by using loop prevention technology. Which item below can be used to help prevent loops?
(Multiple Choice)
4.7/5
(27)
The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks:
(Multiple Choice)
4.8/5
(34)
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
(True/False)
4.8/5
(36)
The ____________________ Layer is omitted in the TCP/IP model.
(Short Answer)
4.9/5
(39)
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?
(Multiple Choice)
4.8/5
(34)
In what type of cloud computing does the customer have the highest level of control?
(Multiple Choice)
4.9/5
(34)
What protocol suite below is the most commonly used protocol for local area network (LAN) communication?
(Multiple Choice)
4.9/5
(28)
Which of the following is not a benefit that can be provided by using IP telephony?
(Multiple Choice)
5.0/5
(25)
Matching
-An instance of a particular state of a virtual machine that can be saved for later use.
(Multiple Choice)
4.9/5
(35)
What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting?
(Multiple Choice)
4.8/5
(38)
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
(Essay)
4.9/5
(29)
Matching
-A means of managing and presenting computer resources by function without regard to their physical layout or location.
(Multiple Choice)
4.9/5
(37)
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)