100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Chapter 13 Network Pro practice exams questions and answers

Puntuación
-
Vendido
-
Páginas
17
Grado
A+
Subido en
02-02-2024
Escrito en
2023/2024

Chapter 13 Network Pro practice exams questions and answers

Institución
Grado










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Grado

Información del documento

Subido en
2 de febrero de 2024
Número de páginas
17
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Chapter 13 Network Pro practice exams
questions and answers

You have just purchased a new network device and are getting ready to connect it to
your network. Which of the following should you do to increase its security? select two -
Answer- Apply all patches and updates

Change default account password

As a victim of a Smurf attack, what protection measure is the most effective during the
attack? - Answer- Communication with our upstream provider

Which of the following attacks tries to associate an incorrect MAC address with a know
IP address? - Answer- ARP poisoning

Which of the following best describes the Ping of Death exploit? - Answer- An ICMP
packet larger than 65,536 bytes?

Which exploit seeks to maliciously re-associate the IP address of a legitimate network
host with the MAC address of the attacker's computer? - Answer- ARP poisoning

You have a group of salesmen who would like to access your private network through
the Internet while they are traveling. You want to control access to the private network
through a single server.
Which solution should you implement? - Answer- VPN concentrator

You have a group of salesmen who would like to access your private network through
the Internet while they are traveling. You want to control access to the private network
through a single server.
Which solution should you implement? - Answer- VPN concentrator

A salesperson in your organization spent most of her time traveling between customers
sites. After a customer visit, she must complete various managerial tasks, such as
updating your organizations order database.
Because she rarely...
many of the things...
Which key step should you take when implementing this configurations? select two -
Answer- Configure the VPN connection to us IPsec

,Configure the browser to sent HTTPS requests through the VPN connection

A VPN is used primarily for what purpose? - Answer- Support secured communications
over an untrusted network.

You want to use a protocol that can encapsulate other LAN protocols and carry the data
securely over an IP network. Which of the following protocols is suitable for this task? -
Answer- PPTP

Which of the following protocols can your portable computer use to connect to your
company's network via a virtual tunnel through the internet? select two - Answer- L2TP
PPTP

IPsec is implemented through two separate protocols. What are these protocols called?
select two - Answer- AH
ESP

Which of the following network layer protocols provides authentications and encryptions
services for IP based network traffic? - Answer- IPsec

Which of the following statements about SSL VPN are true? select two - Answer- Uses
port 443
Encrypts the entire communication session

Which of the following can route layer 3 protocols across an IP network? - Answer- GRE

You have just downloaded a file. You created a hash of the file and compare it to the
hash posted on the website. The two hashes match. What do you know about the file? -
Answer- Your copy is the same as the copy posted on the website

Which of the following network devices or services prevents the use of IPsec in most
cases? - Answer- NAT

• The office manager informs you that her desktop system will no longer boot and asks
you to repair or replace it, recovering as much data as possible in the process. You
carry the workstation out to your car and bring it back to your office to work on it.
What securityrelated recommendations should you make to this client? - Answer-
Implement a hardware checkout policy

What is a secure doorway that can be used in coordination with a mantrap to allow easy
egress from a secured environment but which actively prevents re-entrance through the
exit portal? - Answer- Turnstiles

Which of the following are solutions that address physical security?(Select two) -
Answer- Require identification and name badges for all employees //Escort visitors at all
times

, Which of the following can be used to stop piggybacking that has been occurring at the
front entrance where employees should swipe their smart cards to gain entry? - Answer-
Deploy a mantrap

You want to use CCTV to increase the physical security of your building. Which of the
following camera types would offer the sharpest image at the greatest distance under
the lowest lighting conditions? - Answer- 500 resolution, 50mm, .05 LUX

You want to use CCTV to increase your physical security. You want to be able to
remotely control the camera position. Which type of camera should you choose? -
Answer- PTZ

You want to use CCTV as a preventative security measure. Which of the following is a
requirement for your plan? - Answer- Security guards

Which of the following CCTV types would you use in areas with little or no lights? -
Answer- Infrared

Which of the following CCTV camera types lets you adjust the distance that the camera
can see? - Answer- Varifocal

Which of the following controls is an example of a physical access control method? -
Answer- Locks on doors

You have 5 salesmen who work out of your office and who frequently leave their laptops
laying on their desk in their cubicles. You are concerned that someone might walk by
and take one of these laptops.
Which of the following is the best protection to implement to address your concerns? -
Answer- Use cable locks to chain the laptops to the desks

Match each physical security control on the left with an appropriate example of that
control on
the right. Each security control may be used once, more than once, or not at all. -
Answer- Hardened carrier
Protected cable distribution
Biometric authentication
Door locks
Barricades
Perimeter barrier
Emergency escape plans
Safety
Alarmed carrier
Protected cable distribution
Antipassback system
Physical access control
$14.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
millyphilip West Virginia University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2814
Miembro desde
3 año
Número de seguidores
1959
Documentos
41009
Última venta
2 días hace
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.7

534 reseñas

5
234
4
83
3
103
2
31
1
83

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes