key pair
  • The combination of a public key and a private key are known by what term below?
  • VMware Player and Linux KVM are both examples of what type of hypervisor?
  • what is the first phase of properly managing and applying security patches?
  • At what layer of the OSI model does the IPsec encryption protocol operate?
exploit
  • The combination of a public key and a private key are known by what term below?
  • Which of the following types of VLANs receives all untagged frames from untagged ports?
  • The act of taking advantage of a vulnerability is known as which of the following?
  • Which of the following cloud deployment models would the Internet be considered as an example?
discovery
  • Which of the following types of VLANs receives all untagged frames from untagged ports?
  • The combination of a public key and a private key are known by what term below?
  • what is the first phase of properly managing and applying security patches?
  • Which of the following cloud deployment models would the Internet be considered as an example?
FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.
  • True
  • False
digital certificate
  • Which of the following terms best describe a small file containing verified identification information about the user and the user's public key
  • Which of the following access control methods does not require direct contact with a proximity reader in order to be detected?
  • Which of the following types of VLANs receives all untagged frames from untagged ports?
  • Which of the following cloud deployment models would the Internet be considered as an example?
Public
  • Which of the following access control methods does not require direct contact with a proximity reader in order to be detected?
  • Which of the following types of VLANs receives all untagged frames from untagged ports?
  • Which of the following terms best describe a small file containing verified identification information about the user and the user's public key
  • Which of the following cloud deployment models would the Internet be considered as an example?
Network Layer
  • what is the first phase of properly managing and applying security patches?
  • At what layer of the OSI model does the IPsec encryption protocol operate?
  • Which of the following types of VLANs receives all untagged frames from untagged ports?
  • A centrally managed DHCP server can provide DHCP assignments to multiple subnets with the help of which of the following?
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
  • Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
  • what type of scenario would be best served by using a Platform as a Service (PaaS) cloud model
  • Which type of protocol allows the client and server to introduce themselves to each other and establish terms for how they will exchange data?
  • what is the first phase of properly managing and applying security patches?
tamper detection sensor
  • Which of the following types of VLANs receives all untagged frames from untagged ports?
  • Which of the following terms best describe a small file containing verified identification information about the user and the user's public key
  • Which of the following cloud deployment models would the Internet be considered as an example?
  • Which of the following detection methods can detect physical penetration, temperature extremes, input voltage variations, or certain kinds of radiation?
phishing attack
  • The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?
  • The act of taking advantage of a vulnerability is known as which of the following?
  • True
  • What term best describes the process of transforming data through an algorithm that generally reduces the amount of space needed for data?
native LAN
  • Which of the following access control methods does not require direct contact with a proximity reader in order to be detected?
  • Which of the following detection methods can detect physical penetration, temperature extremes, input voltage variations, or certain kinds of radiation?
  • Which of the following types of VLANs receives all untagged frames from untagged ports?
  • At what layer of the OSI model does the IPsec encryption protocol operate?
In an authorization file on the host where the SSH server is
  • Because public key encryption requires the use of two different keys, it is also known as which type of encryption?
  • When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
  • When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?
  • In which type of vulnerability scan does the attacker begin on the perimeter of the network, looking for vulnerabilities that do not require trusted user privileges?
LAAS
  • In which cloud computing service model are hardware services provided virtually, including network infrastructure devices such as virtual servers?
  • In which type of vulnerability scan does the attacker begin on the perimeter of the network, looking for vulnerabilities that do not require trusted user privileges?
  • Which type of protocol allows the client and server to introduce themselves to each other and establish terms for how they will exchange data?
  • The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
asymmetric
  • When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
  • Because public key encryption requires the use of two different keys, it is also known as which type of encryption?
  • A program that disguises itself as something useful but actually harms your system is known as which of the following?
  • Which of the following access control methods does not require direct contact with a proximity reader in order to be detected?
Iaas
  • Which of the following is an older, Layer 2 protocol developed by Microsoft that encapsulates VPN data frames?
  • In which type of vulnerability scan does the attacker begin on the perimeter of the network, looking for vulnerabilities that do not require trusted user privileges?
  • Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
  • The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
hashing
  • Which type of protocol allows the client and server to introduce themselves to each other and establish terms for how they will exchange data?
  • What term best describes the process of transforming data through an algorithm that generally reduces the amount of space needed for data?
  • In which networking mode, can VMs on one host exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host?
  • What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
man-in-the-middle attack
  • what type of scenario would be best served by using a Platform as a Service (PaaS) cloud model
  • The act of taking advantage of a vulnerability is known as which of the following?
  • True
  • Which of the following describes an attack where a person redirects and captures secure transmissions as they occur?
FCS
  • What term best describes the process of transforming data through an algorithm that generally reduces the amount of space needed for data?
  • The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
  • To identify the transmissions that belong to each VLAN, the switch adds which of the following to Ethernet frames?
  • What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission
0:0:1



Answered

Not Answered

Not Visited
Correct : 0
Incorrect : 0