Question 13 Barbara is investigating an attack against her network She notices

Question 13 barbara is investigating an attack

This preview shows page 25 - 45 out of 103 pages.

Question 13 Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?
Background image
Answers: TeardropLandSmurfCross-site scripting (XSS)
Background image
Selected Answer: SmurfAnswers: TeardropLandSmurfCross-site scripting (XSS)
Background image
Question 14What type of network connects systems over the largest geographic area?Answers: Wide area network (WAN)Metropolitan area network (MAN)Local area network (LAN)Storage area network (SAN)
Background image
Selected Answer: Wide area network (WAN)Answers: Wide area network (WAN)Metropolitan area network (MAN)Local area network (LAN)Storage area network (SAN)
Background image
Question 15 A network protocol governs how networking equipment interacts to deliver data across the network.T/F
Background image
Selected Answer: TrueAnswers: TrueFalse
Background image
Question 1 Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new
Background image
hardware. What technology can she use?Answers: FirewallVirtual LAN (VLAN)Virtual private network (VPN)Transport Layer Security (TLS)
Background image
Selected Answer: Virtual LAN (VLAN)Answers: FirewallVirtual LAN (VLAN)Virtual private network (VPN)Transport Layer Security (TLS)Question 2
Background image
A wireless access point (WAP) is the connection between a wired and wireless network.T/F
Background image
Selected Answer: TrueAnswers: TrueFalse
Background image
Question 3 Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?Answers: Firewall
Background image
HubSwitchRouterSelected Answer: HubAnswers: FirewallHub
Background image
SwitchRouterQuestion 4 What type of firewall security feature limits the volume of traffic from individual hosts?
Background image
Answers: Loop protectionNetwork separationStateful inspectionFlood guard
Background image
Selected Answer: Flood guardAnswers: Loop protectionNetwork separationStateful inspectionFlood guard
Background image
Question 5 What wireless security technology contains significant flaws and should never be used?Answers: Wired Equivalent Privacy (WEP)Wi-Fi Protected Access (WPA)WPA2Remote Authentication Dial-In User Service (RADIUS)
Background image
Selected Answer: Wired Equivalent Privacy (WEP)Answers: Wired Equivalent Privacy (WEP)Wi-Fi Protected Access (WPA)WPA2Remote Authentication Dial-In User Service (RADIUS)
Background image
Question 6 What is the maximum value for any octet in an IPv4 IP address?
Background image
Image of page 45

You've reached the end of your free preview.

Want to read all 103 pages?

  • Fall '15
  • Charles
  • Computer network, IP address, Local area network, Wi-Fi, Wi-Fi Protected Access, Wired Equivalent Privacy

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture