Exam 11: Network Security
Exam 1: Introduction to Data Communications79 Questions
Exam 2: Application Layer99 Questions
Exam 3: Physical Layer143 Questions
Exam 4: Data Link Layer98 Questions
Exam 5: Network and Transport Layers117 Questions
Exam 6: Network Design76 Questions
Exam 7: Wired and Wireless Local Area Networks141 Questions
Exam 8: Backbone Networks68 Questions
Exam 9: Wide Area Networks77 Questions
Exam 10: The Internet73 Questions
Exam 11: Network Security127 Questions
Exam 12: Network Management69 Questions
Select questions type
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.
(Multiple Choice)
4.9/5
(38)
A n) ______ is a special type of virus that spreads itself without human intervention.
(Multiple Choice)
4.9/5
(28)
The use of hacking techniques to bring attention to a larger political or social goal is referred to as
(Multiple Choice)
4.8/5
(40)
A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.
(True/False)
4.8/5
(35)
Fault-intolerant servers contain many redundant components to prevent failure.
(True/False)
4.9/5
(34)
A packet-level firewall examines the source and destination address of every network packet that passes though the firewall
(True/False)
4.9/5
(38)
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?
(Multiple Choice)
4.8/5
(31)
The key principle in preventing disruption, destruction and disaster is ___________.
(Multiple Choice)
4.9/5
(36)
Social engineering refers to creating a team that solves virus problems.
(True/False)
5.0/5
(45)
A Trojan horse allows a user to access a computer from a remote location.
(True/False)
4.8/5
(39)
A network switch failure is an example of an) ________ threat.
(Multiple Choice)
4.8/5
(37)
Describe the four risk control strategies and when you might use each one.
(Essay)
4.9/5
(45)
An uninterruptible power supply utilizes a second redundant disk for every disk on the server.
(True/False)
4.7/5
(37)
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.
(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 127
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)