Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

13.A company needs to secure the network using a security system that can inspect the network traffic's payload to prevent attacks. What type of firewall

13.A company needs to secure the network using a security system that can inspect the network traffic's payload to prevent attacks. What type of firewall would you recommend? (4 Points) Application Firewall Stateful Firewall Packet Filtering Layer 3 or 4 Firewall

14.If someone poses as the IT network admin, walks into a building and asks for the receiptionist password to provide an update to their computer, what type of attack is this most likely to be? (4 Points) Phishing Social Engineering SQL Injection Man-in-the-Middle

15.If a user can simply reconnect during an Deauth attack. Why would a hacker use this attack? Choose three correct answers. (4 Points) To prevent access To advertise their business To create fake access point of attack To gain intelligence to hack the WPA of the network

16.What are two types of encryption? (4 Points) Symmetric encryption, the same key encrypts and decrypts data; asymmetric encryption different keys encrypt and decrypt data Synchronous encryption, the same key encrypts and decrypts data; asynchronous encryption different keys encrypt and decrypt data Symmetric encryption, a different key encrypts and decrypts data; asymmetric encryption, the same key encrypts and decrypts data Synchronous encryption, a different key encrypts and decrypts data; asynchronous encryption the same key encrypts and decrypts data

17.How can a network admin harden hosts and network devices? Choose all correct answers. (4 Points) Lock all doors to IT assets Remove default or out of the box passwords. Remove all unnecessary logins Keep patches up to date Audit Access

18.What does AAA stand for? (4 Points) Authorization, Access and Accounting Authentication, Access and Autoscaling Authentication, Authorization and Accounting Access, Authorization and Authentication

19.Describe a personal firewall. (4 Points) A hardware device that protects a computer from network attacks A type of software that protects a computer from network attacks A server on a network that provides IP addresses from a pool. A sever on a network that provides virtual resources.

20.If you are using an unsecure network and need to login to data you would like keep secure during transmission what should you do? (4 Points) Turn on Windows Firewall Remove all USB drives, update the system using the latest security updates Only access data when you are physically on site Deploy a VPN (Virtual Private Network) and use a secure tunneling protocol

21.What phrase represents Authentication best? (4 Points) Do you do what you say you will do? Are you credentialed for the level of access you need? Did you arrive at the time you said you did? Are you who you say you are?

22.Place the wireless encryptions in order from the weakest to the strongest (4 Points) WEP WPA WPA3 WPA2

23.MFA protects identities by (4 Points) Tracking the place where a login attempt occurs Monitoring the hours when a login takes place Limiting multiple attempts using a username and password Using two methods of authentication Using only one login to access multiple resources

24.What phrase represents Accounting the best? (4 Points) What did you do? Are you who you say you are? What can you do, based on who you are? Who are you?

25.What is the best example of Private Cloud? (4 Points) Microsoft Azure in a multi-tenant configuration A datacenter owned by the government that allows federated access to public vendors A cloud environment shared between the CDC and WHO A datacenter owned by Hospital.com for Hospital.com employee apps and resources Google Cloud Platform in a multi-tenant configuration

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James Kurose, Keith Ross

7th edition

978-0133594140

More Books

Students also viewed these Computer Network questions