Chapter 4 Review Questions
1. Which of the following is NOT an activity phase control?
c. resource control
2. Which of the following is NOT a motion detection method?
3. A lock that extends a solid metal bar into the doo
CIST 2602- Network Security Lab 6
Project 8-1: Using an Application Sandbox
Project 8-4: View SNMP Management Information
Base (MIB) Elements
Project 8-5: Viewing Logs Using the Microsoft Windows
Project 8-6: Creating a Custom View in Microso
CIST 2602- Network Security Lab 7
Project 9-1: Viewing WLAN Security Information
Project 9-2: Substitute a MAC Address Using SMAC
Project 9-3: Use Microsoft Windows Netsh Commands
Project 9-4: Configuring Access PointsWPA2 and WPS
Chapter 2 Review Questions
1. Which of these is not an action that a virus can take?
a. transport itself through the network to another device
2. Which of the following is an attempt to influence a user by coercion?
Chapter 6 Review
1. _ performs a real-time lookup of a digital certificates status.
b. Online Certificate Status Protocol (OCSP)
2. Which of these is considered the weakest cryptographic transport protocol?
a. SSL v2.0
3. A digital
Chapter 10 Review
1. Each optional feature is found on mobile devices EXCEPT _.
c. operating system
2. Tablet computers are designed for _.
b. ease of use
3. Which of these is not a size of SD cards?
4. Mobile devices usi
Chapter 5 Review Questions
1. What is the latest version of the Secure Hash Algorithm?
2. Elliptic Curve Diffie-Hellman (ECDH) is an example of _?
a. in-band key exchange
3. Public key systems that generate random public ke
Chapter 7 Review
1. Which of these would NOT be a filtering mechanism found in a firewall rule?
2. Which function does an Internet content filter NOT perform?
d. intrusion detection
3. How does a virtual LAN (VLAN) allow dev
Chapter 8 Review
1. Which Fibre Channel zone is the most restrictive?
a. FC hard zone
2. Which type of log can provide details regarding requests for specific files on a system?
b. access log
3. Which type of cloud is offered to all
Chapter 1 Review Questions
1. Which of the following was used to describe attackers who would break into a computer
system without the owners permission and publicly disclose the vulnerability?
b. black hat hackers
2. Why can broker
Chapter 9 Review
1. Bluetooth falls under the category of _.
d. personal area network (PAN)
2. Which of these technologies is NOT found in a wireless broadband router?
a. wireless probe
3. Which of these is NOT a risk when a home wi
CIST2602-Network Security Final Exam Study Guide
Final Exam Study Guide
Grade not available.
Results Displayed Submitted Answers, Incorrectly