100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

COMPUTER NETWORKS EXAM 3 QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
30-01-2025
Written in
2024/2025

COMPUTER NETWORKS EXAM 3 QUESTIONS AND ANSWERS

Institution
COMPUTER NETWORKING
Course
COMPUTER NETWORKING








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
COMPUTER NETWORKING
Course
COMPUTER NETWORKING

Document information

Uploaded on
January 30, 2025
Number of pages
2
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

COMPUTER NETWORKS EXAM 3
QUESTIONS AND ANSWERS
Examples of different types of pen testing - Answer-black box/ unknown environment,
white box/ known environment, and gray box/ partially known environment

Cold backup site - Answer-it can be up and running in a short period of time, such as a
day or two. provides the physical location and basic service

Hot backup site - Answer-set up to be ready to go at any moment, within a few hours it
can become a fully functioning element of an organization

Warm backup site - Answer-typically has computers but its not configured ready to go,
the time it takes to operate lands in between the cold and hot sites

What is social engineering - Answer-it is a hacker term for tricking people into revealing
their password or other security information. its an attack that attempts to take
advantage of human behavior

What is fault tolerance - Answer-the capability to withstand a failure without losing data

What is phishing - Answer-it involves getting offers of products, services or opportunities
through emails, phone calls, and text messages. it is designed to trick individuals into
giving out personal information such as credit card numbers and account numbers

what is clustering - Answer-a method of balancing loads and providing fault tolerance
The physical documentation of a network should include the following elements: -
Answer-cabling information, servers, network devices, wide-area network, and user
information

examples of different policies found within the organization - Answer-password policies,
bring your own device (BYOD), acceptable use policy (AUP), user account policy,
disaster recovery plan, business continuity plan (BCP), nondisclosure agreements
(NDAs), service level agreements (SLAs), memorandum of understanding (MOU),
safety procedure and policies

which documentation is the most important - Answer-configuration documentation

What does CIA stand for - Answer-Confidentiality, Integrity, and Availability

access control standards - Answer-describes the mechanisms used to filter network
traffic to determine who is and who is not allowed to access the network and network
resources

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
biggdreamer Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
247
Member since
2 year
Number of followers
68
Documents
17943
Last sold
6 days ago

4.0

38 reviews

5
22
4
4
3
6
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions