A virus can replicate itself with the intent to infect more computers.
  • What kind of vulnerability is exploited by a ping of death?
  • What's the difference between an IDS and an IPS?
  • What kind of virus runs in place of the computer's normal system files?
  • What distinguishes a virus from other types of malware?
An IDS can only detect and log suspicious activity. An IPS can react when alerted to such activity.
  • What's the difference between an IDS and an IPS?
  • What of the following features does not distinguish an NGFW from traditional firewalls?
  • What distinguishes a virus from other types of malware?
  • What feature of Windows Server allows for agentless authentication?
To simplify the process of granting rights to users
  • What kinds of issues might indicate a misconfigured ACL?
  • What are the two primary features that give proxy servers an advantage over NAT?
  • What of the following features does not distinguish an NGFW from traditional firewalls?
  • Regarding managing security levels, why do network administrators create domain groups?
The default password was not changed.
  • Regarding managing security levels, why do network administrators create domain groups?
  • A neighbor hacks into your secured wireless network on a regular basis, but you didn't give him the password. What loophole was most likely left open?
  • What are the two primary features that give proxy servers an advantage over NAT?
  • What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
denied, implicit deny rule
  • Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
  • What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
  • Any traffic that is not explicitly permitted in the ACL is , which is called the .
  • What are the two primary features that give proxy servers an advantage over NAT?
ARP performs no authentication.
  • What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
  • What kind of firewall blocks traffic based on application data contained within the packets?
  • What are the two primary features that give proxy servers an advantage over NAT?
  • What of the following features does not distinguish an NGFW from traditional firewalls?
Connectivity and performance issues between two hosts
  • At what layer of the OSI model do proxy servers operate?
  • What kind of vulnerability is exploited by a ping of death?
  • What kind of virus runs in place of the computer's normal system files?
  • What kinds of issues might indicate a misconfigured ACL?
The vulnerability is exploited before the software developer has the opportunity to provide a solution for it.
  • What kind of virus runs in place of the computer's normal system files?
  • What of the following features does not distinguish an NGFW from traditional firewalls?
  • What unique characteristic of zero-day exploits make them so dangerous?
  • What feature of Windows Server allows for agentless authentication?
Content filtering, file caching
  • What kinds of issues might indicate a misconfigured ACL?
  • What are the two primary features that give proxy servers an advantage over NAT?
  • What of the following features does not distinguish an NGFW from traditional firewalls?
  • What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
0:0:1



Answered

Not Answered

Not Visited
Correct : 0
Incorrect : 0