Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Network+ 8th Edition Chapter 9

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
15-12-2024
Geschreven in
2024/2025

Network+ 8th Edition Chapter 9 1. What statement regarding the different versions of the SHA hashing algorithm is accurate? a. SHA-0 is the most secure version of SHA. b. SHA-1 supports a 128-bit hash function. c. SHA-2 only supports a 256-bit hash. d. SHA-2 and SHA-3 both support the same hash lengths. - SHA-2 and SHA-3 both support the same hash lengths.

Meer zien Lees minder
Instelling
Network+ 8th Edition Chapter 9
Vak
Network+ 8th Edition Chapter 9

Voorbeeld van de inhoud

Network+ 8th Edition Chapter 9
1. What statement regarding the different versions of the SHA hashing algorithm is accurate?

a. SHA-0 is the most secure version of SHA.

b. SHA-1 supports a 128-bit hash function.

c. SHA-2 only supports a 256-bit hash.

d. SHA-2 and SHA-3 both support the same hash lengths. - ✔✔SHA-2 and SHA-3 both support the same
hash lengths.



2. A variant of BYOD, what does CYOD allow employees or students to do?



a. They can supply their own software on a computer or mobile device.



b. They can supply their choice of cloud application or storage.



c. They can choose a device from a limited number of options.



d. They can use whatever devices they wish to bring. - ✔✔They can choose a device from a limited
number of options.



3. Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web
pages, or even redirect them to illegitimate web pages?

a. MAC address spoofing

b. denial-of-service attack

c. DNS poisoning

d. rogue DHCP server - ✔✔denial-of-service attack



4. In the typical social engineering attack cycle, what occurs at Phase 3?

a. The attacker researches the desired target for clues as to vulnerabilities.

b. The attacker builds trust with the target and attempts to gain more information.

, c. The attacker exploits an action undertaken by the victim in order to gain access.

d. The attacker executes an exit strategy in such a way that does not leave evidence or raise suspicion. -
✔✔The attacker exploits an action undertaken by the victim in order to gain access.



5. In a red team-blue team exercise, what is the purpose of the blue team?

a. The blue team is tasked with attacking the network.

b. The blue team must observe the actions of the red team.

c. The blue team is charged with the defense of the network.

d. The blue team consists of regulators that ensure no illegal activity is undertaken. - ✔✔The blue team
is charged with the defense of the network.



6. What document addresses the specific concerns related to special access given to administrators and
certain support staff?

a. non-disclosure agreement

b. acceptable use policy

c. password policy

d. privileged user agreement - ✔✔privileged user agreement



7. VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software?

a. mobile device management software

b. software defined network software

c. virtual device management software

d. cloud network management software - ✔✔mobile device management software



8. Which command can be used on a Windows system to create a hash of a file?

a. md5

b. shasum

c. Get-FileHash

d. Compute-FileHash - ✔✔Get-FileHash

Geschreven voor

Instelling
Network+ 8th Edition Chapter 9
Vak
Network+ 8th Edition Chapter 9

Documentinformatie

Geüpload op
15 december 2024
Aantal pagina's
7
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€11,59
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Stan911

Maak kennis met de verkoper

Seller avatar
Stan911 Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
1 jaar
Aantal volgers
0
Documenten
75
Laatst verkocht
-

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen