100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Chapter 13 Network Pro practice exams questions and answers

Beoordeling
-
Verkocht
-
Pagina's
17
Cijfer
A+
Geüpload op
02-02-2024
Geschreven in
2023/2024

Chapter 13 Network Pro practice exams questions and answers

Instelling
Vak










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Vak

Documentinformatie

Geüpload op
2 februari 2024
Aantal pagina's
17
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Chapter 13 Network Pro practice exams
questions and answers

You have just purchased a new network device and are getting ready to connect it to
your network. Which of the following should you do to increase its security? select two -
Answer- Apply all patches and updates

Change default account password

As a victim of a Smurf attack, what protection measure is the most effective during the
attack? - Answer- Communication with our upstream provider

Which of the following attacks tries to associate an incorrect MAC address with a know
IP address? - Answer- ARP poisoning

Which of the following best describes the Ping of Death exploit? - Answer- An ICMP
packet larger than 65,536 bytes?

Which exploit seeks to maliciously re-associate the IP address of a legitimate network
host with the MAC address of the attacker's computer? - Answer- ARP poisoning

You have a group of salesmen who would like to access your private network through
the Internet while they are traveling. You want to control access to the private network
through a single server.
Which solution should you implement? - Answer- VPN concentrator

You have a group of salesmen who would like to access your private network through
the Internet while they are traveling. You want to control access to the private network
through a single server.
Which solution should you implement? - Answer- VPN concentrator

A salesperson in your organization spent most of her time traveling between customers
sites. After a customer visit, she must complete various managerial tasks, such as
updating your organizations order database.
Because she rarely...
many of the things...
Which key step should you take when implementing this configurations? select two -
Answer- Configure the VPN connection to us IPsec

,Configure the browser to sent HTTPS requests through the VPN connection

A VPN is used primarily for what purpose? - Answer- Support secured communications
over an untrusted network.

You want to use a protocol that can encapsulate other LAN protocols and carry the data
securely over an IP network. Which of the following protocols is suitable for this task? -
Answer- PPTP

Which of the following protocols can your portable computer use to connect to your
company's network via a virtual tunnel through the internet? select two - Answer- L2TP
PPTP

IPsec is implemented through two separate protocols. What are these protocols called?
select two - Answer- AH
ESP

Which of the following network layer protocols provides authentications and encryptions
services for IP based network traffic? - Answer- IPsec

Which of the following statements about SSL VPN are true? select two - Answer- Uses
port 443
Encrypts the entire communication session

Which of the following can route layer 3 protocols across an IP network? - Answer- GRE

You have just downloaded a file. You created a hash of the file and compare it to the
hash posted on the website. The two hashes match. What do you know about the file? -
Answer- Your copy is the same as the copy posted on the website

Which of the following network devices or services prevents the use of IPsec in most
cases? - Answer- NAT

• The office manager informs you that her desktop system will no longer boot and asks
you to repair or replace it, recovering as much data as possible in the process. You
carry the workstation out to your car and bring it back to your office to work on it.
What securityrelated recommendations should you make to this client? - Answer-
Implement a hardware checkout policy

What is a secure doorway that can be used in coordination with a mantrap to allow easy
egress from a secured environment but which actively prevents re-entrance through the
exit portal? - Answer- Turnstiles

Which of the following are solutions that address physical security?(Select two) -
Answer- Require identification and name badges for all employees //Escort visitors at all
times

, Which of the following can be used to stop piggybacking that has been occurring at the
front entrance where employees should swipe their smart cards to gain entry? - Answer-
Deploy a mantrap

You want to use CCTV to increase the physical security of your building. Which of the
following camera types would offer the sharpest image at the greatest distance under
the lowest lighting conditions? - Answer- 500 resolution, 50mm, .05 LUX

You want to use CCTV to increase your physical security. You want to be able to
remotely control the camera position. Which type of camera should you choose? -
Answer- PTZ

You want to use CCTV as a preventative security measure. Which of the following is a
requirement for your plan? - Answer- Security guards

Which of the following CCTV types would you use in areas with little or no lights? -
Answer- Infrared

Which of the following CCTV camera types lets you adjust the distance that the camera
can see? - Answer- Varifocal

Which of the following controls is an example of a physical access control method? -
Answer- Locks on doors

You have 5 salesmen who work out of your office and who frequently leave their laptops
laying on their desk in their cubicles. You are concerned that someone might walk by
and take one of these laptops.
Which of the following is the best protection to implement to address your concerns? -
Answer- Use cable locks to chain the laptops to the desks

Match each physical security control on the left with an appropriate example of that
control on
the right. Each security control may be used once, more than once, or not at all. -
Answer- Hardened carrier
Protected cable distribution
Biometric authentication
Door locks
Barricades
Perimeter barrier
Emergency escape plans
Safety
Alarmed carrier
Protected cable distribution
Antipassback system
Physical access control
€12,74
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
millyphilip West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2814
Lid sinds
3 jaar
Aantal volgers
1959
Documenten
41009
Laatst verkocht
2 dagen geleden
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3,7

534 beoordelingen

5
234
4
83
3
103
2
31
1
83

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen