Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Network+ 8th Edition Chapter 9

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
15-12-2024
Written in
2024/2025

Network+ 8th Edition Chapter 9 1. What statement regarding the different versions of the SHA hashing algorithm is accurate? a. SHA-0 is the most secure version of SHA. b. SHA-1 supports a 128-bit hash function. c. SHA-2 only supports a 256-bit hash. d. SHA-2 and SHA-3 both support the same hash lengths. - SHA-2 and SHA-3 both support the same hash lengths.

Show more Read less
Institution
Network+ 8th Edition Chapter 9
Course
Network+ 8th Edition Chapter 9

Content preview

Network+ 8th Edition Chapter 9
1. What statement regarding the different versions of the SHA hashing algorithm is accurate?

a. SHA-0 is the most secure version of SHA.

b. SHA-1 supports a 128-bit hash function.

c. SHA-2 only supports a 256-bit hash.

d. SHA-2 and SHA-3 both support the same hash lengths. - ✔✔SHA-2 and SHA-3 both support the same
hash lengths.



2. A variant of BYOD, what does CYOD allow employees or students to do?



a. They can supply their own software on a computer or mobile device.



b. They can supply their choice of cloud application or storage.



c. They can choose a device from a limited number of options.



d. They can use whatever devices they wish to bring. - ✔✔They can choose a device from a limited
number of options.



3. Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web
pages, or even redirect them to illegitimate web pages?

a. MAC address spoofing

b. denial-of-service attack

c. DNS poisoning

d. rogue DHCP server - ✔✔denial-of-service attack



4. In the typical social engineering attack cycle, what occurs at Phase 3?

a. The attacker researches the desired target for clues as to vulnerabilities.

b. The attacker builds trust with the target and attempts to gain more information.

, c. The attacker exploits an action undertaken by the victim in order to gain access.

d. The attacker executes an exit strategy in such a way that does not leave evidence or raise suspicion. -
✔✔The attacker exploits an action undertaken by the victim in order to gain access.



5. In a red team-blue team exercise, what is the purpose of the blue team?

a. The blue team is tasked with attacking the network.

b. The blue team must observe the actions of the red team.

c. The blue team is charged with the defense of the network.

d. The blue team consists of regulators that ensure no illegal activity is undertaken. - ✔✔The blue team
is charged with the defense of the network.



6. What document addresses the specific concerns related to special access given to administrators and
certain support staff?

a. non-disclosure agreement

b. acceptable use policy

c. password policy

d. privileged user agreement - ✔✔privileged user agreement



7. VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software?

a. mobile device management software

b. software defined network software

c. virtual device management software

d. cloud network management software - ✔✔mobile device management software



8. Which command can be used on a Windows system to create a hash of a file?

a. md5

b. shasum

c. Get-FileHash

d. Compute-FileHash - ✔✔Get-FileHash

Written for

Institution
Network+ 8th Edition Chapter 9
Course
Network+ 8th Edition Chapter 9

Document information

Uploaded on
December 15, 2024
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
Stan911

Get to know the seller

Seller avatar
Stan911 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
75
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions