Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The network administrator configures a VPN tunnel from a remote office to the main facility.A problem has occurred in the link.Which are the main steps the administrator should take to resolve the problem

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

A,C

The network management is concerned about intrusion problems.The network administrator recommends intrusion detection be placed on the network.This will do which of the following

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B,D

What ACL entry would eliminate the effect of the implicit deny?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

A

What wireless security technology replaces WEP as the main security mechanism?

(Multiple Choice)
4.9/5
(40)

Which is not a stage of forensics examination?

(Multiple Choice)
4.9/5
(36)

There is a new virus reported on the Internet.What steps should the network administrator take to protect the network from the threat?

(Multiple Choice)
4.9/5
(29)

A network administrator is considering placing a firewall on an internal file server in the network.What is the purpose of the firewall,and is it important for the firewall to be stateful?

(Multiple Choice)
4.8/5
(34)

A network administrator is concerned that the network is vulnerable to a denial-of-service attack.What steps should be taken to reduce this threat

(Multiple Choice)
4.9/5
(32)

When would a network administrator use L2TP?

(Multiple Choice)
4.8/5
(36)

A dictionary attack is being used by an attacker to break into a network.What does this mean?

(Multiple Choice)
4.9/5
(24)

Which of the following is a Linux-based port scanner that is now ported to most all operating systems?

(Multiple Choice)
4.8/5
(36)

Why would a network administrator configure access lists to filter data packets on a routers interface?

(Multiple Choice)
4.7/5
(38)

Where might you place servers that require access from the public network?

(Multiple Choice)
4.8/5
(38)

The network administrator suspects that packet sniffing is being used to capture data packets in the network.The network administrator is using an SSH connection for all critical applications,and switches are being used on all network connections.Should the network administrator be concerned?

(Multiple Choice)
4.8/5
(26)

An attacker to a network is using social engineering to attack a network.This means which of the following

(Multiple Choice)
4.8/5
(39)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)