Chapter 13 Network Pro practice exams questions and answers
Chapter 13 Network Pro practice exams questions and answers You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? select two -Answer- Apply all patches and updates Change default account password As a victim of a Smurf attack, what protection measure is the most effective during the attack? - Answer-Communication with our upstream provider Which of the following attacks tries to associate an incorrect MAC address with a know IP address? -Answer-ARP poisoning Which of the following best describes the Ping of Death exploit? -Answer-An ICMP packet larger than 65,536 bytes? Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker's computer? -Answer-ARP poisoning You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? -Answer-VPN concentrator You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? -Answer-VPN concentrator A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database. Because she rarely... many of the things... Which key step should you take when implementing this configurations? select two -Answer- Configure the VPN connection to us IPsec Configure the browser to sent HTTPS requests through the VPN connection A VPN is used primarily for what purpose? -Answer-Support secured communications over an untrusted network. You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? -Answer-PPTP Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? select two -Answer-L2TP
Written for
- Institution
- TestOut Network Pro
- Course
- TestOut Network Pro
Document information
- Uploaded on
- February 5, 2024
- Number of pages
- 18
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
chapter 13 network pro practice exams questions an
Also available in package deal