Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

Network+ 8th Edition Chapter 9

Puntuación
-
Vendido
-
Páginas
7
Grado
A+
Subido en
15-12-2024
Escrito en
2024/2025

Network+ 8th Edition Chapter 9 1. What statement regarding the different versions of the SHA hashing algorithm is accurate? a. SHA-0 is the most secure version of SHA. b. SHA-1 supports a 128-bit hash function. c. SHA-2 only supports a 256-bit hash. d. SHA-2 and SHA-3 both support the same hash lengths. - SHA-2 and SHA-3 both support the same hash lengths.

Mostrar más Leer menos
Institución
Network+ 8th Edition Chapter 9
Grado
Network+ 8th Edition Chapter 9

Vista previa del contenido

Network+ 8th Edition Chapter 9
1. What statement regarding the different versions of the SHA hashing algorithm is accurate?

a. SHA-0 is the most secure version of SHA.

b. SHA-1 supports a 128-bit hash function.

c. SHA-2 only supports a 256-bit hash.

d. SHA-2 and SHA-3 both support the same hash lengths. - ✔✔SHA-2 and SHA-3 both support the same
hash lengths.



2. A variant of BYOD, what does CYOD allow employees or students to do?



a. They can supply their own software on a computer or mobile device.



b. They can supply their choice of cloud application or storage.



c. They can choose a device from a limited number of options.



d. They can use whatever devices they wish to bring. - ✔✔They can choose a device from a limited
number of options.



3. Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web
pages, or even redirect them to illegitimate web pages?

a. MAC address spoofing

b. denial-of-service attack

c. DNS poisoning

d. rogue DHCP server - ✔✔denial-of-service attack



4. In the typical social engineering attack cycle, what occurs at Phase 3?

a. The attacker researches the desired target for clues as to vulnerabilities.

b. The attacker builds trust with the target and attempts to gain more information.

, c. The attacker exploits an action undertaken by the victim in order to gain access.

d. The attacker executes an exit strategy in such a way that does not leave evidence or raise suspicion. -
✔✔The attacker exploits an action undertaken by the victim in order to gain access.



5. In a red team-blue team exercise, what is the purpose of the blue team?

a. The blue team is tasked with attacking the network.

b. The blue team must observe the actions of the red team.

c. The blue team is charged with the defense of the network.

d. The blue team consists of regulators that ensure no illegal activity is undertaken. - ✔✔The blue team
is charged with the defense of the network.



6. What document addresses the specific concerns related to special access given to administrators and
certain support staff?

a. non-disclosure agreement

b. acceptable use policy

c. password policy

d. privileged user agreement - ✔✔privileged user agreement



7. VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software?

a. mobile device management software

b. software defined network software

c. virtual device management software

d. cloud network management software - ✔✔mobile device management software



8. Which command can be used on a Windows system to create a hash of a file?

a. md5

b. shasum

c. Get-FileHash

d. Compute-FileHash - ✔✔Get-FileHash

Escuela, estudio y materia

Institución
Network+ 8th Edition Chapter 9
Grado
Network+ 8th Edition Chapter 9

Información del documento

Subido en
15 de diciembre de 2024
Número de páginas
7
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$12.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
Stan911

Conoce al vendedor

Seller avatar
Stan911 Chamberlain College Of Nursing
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
-
Miembro desde
1 año
Número de seguidores
0
Documentos
75
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes