Exam 7: Network Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Matching
-A technique that allows private IP addresses to be used on the public Internet.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
F
The OSI model breaks networking steps down into a series of six layers.
Free
(True/False)
4.9/5
(40)
Correct Answer:
False
The traffic sent by devices connected to a hub can be captured and decoded by a _________________.
Free
(Short Answer)
4.9/5
(40)
Correct Answer:
Protocol analyzer
The standard TCP/IP protocol uses IP addresses which are how many bytes in length?
(Multiple Choice)
4.8/5
(40)
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?
(Multiple Choice)
4.9/5
(36)
Matching
-A firewall that can identify the applications that send packets through the firewall and then make decisions about the applications
(Multiple Choice)
4.9/5
(29)
What layer of the OSI model is responsible for permitting two parties on a network to hold ongoing communications across the network?
(Multiple Choice)
4.7/5
(34)
Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?
(Multiple Choice)
4.7/5
(33)
What is the difference between anomaly based monitoring and signature based monitoring?
(Essay)
4.9/5
(35)
Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed.
(Multiple Choice)
4.7/5
(37)
What vendor neutral protocol implements support for VLAN tagging?
(Multiple Choice)
4.9/5
(33)
Matching
-An intrusion prevention system that knows information such as the applications that are running as well as the underlying operating systems
(Multiple Choice)
4.7/5
(38)
How does a Unified Threat Management (UTM) security product help reduce administrative overhead?
(Essay)
4.7/5
(37)
Matching
-Searching incoming web content to match keywords
(Multiple Choice)
4.9/5
(34)
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?
(Multiple Choice)
4.8/5
(32)
A ______________ is a worker who work occasionally or regularly from a home office.
(Short Answer)
4.9/5
(33)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)