Question
13.A company needs to secure the network using a security system that can inspect the network traffic's payload to prevent attacks. What type of firewall
13.A company needs to secure the network using a security system that can inspect the network traffic's payload to prevent attacks. What type of firewall would you recommend? (4 Points) Application Firewall Stateful Firewall Packet Filtering Layer 3 or 4 Firewall
14.If someone poses as the IT network admin, walks into a building and asks for the receiptionist password to provide an update to their computer, what type of attack is this most likely to be? (4 Points) Phishing Social Engineering SQL Injection Man-in-the-Middle
15.If a user can simply reconnect during an Deauth attack. Why would a hacker use this attack? Choose three correct answers. (4 Points) To prevent access To advertise their business To create fake access point of attack To gain intelligence to hack the WPA of the network
16.What are two types of encryption? (4 Points) Symmetric encryption, the same key encrypts and decrypts data; asymmetric encryption different keys encrypt and decrypt data Synchronous encryption, the same key encrypts and decrypts data; asynchronous encryption different keys encrypt and decrypt data Symmetric encryption, a different key encrypts and decrypts data; asymmetric encryption, the same key encrypts and decrypts data Synchronous encryption, a different key encrypts and decrypts data; asynchronous encryption the same key encrypts and decrypts data
17.How can a network admin harden hosts and network devices? Choose all correct answers. (4 Points) Lock all doors to IT assets Remove default or out of the box passwords. Remove all unnecessary logins Keep patches up to date Audit Access
18.What does AAA stand for? (4 Points) Authorization, Access and Accounting Authentication, Access and Autoscaling Authentication, Authorization and Accounting Access, Authorization and Authentication
19.Describe a personal firewall. (4 Points) A hardware device that protects a computer from network attacks A type of software that protects a computer from network attacks A server on a network that provides IP addresses from a pool. A sever on a network that provides virtual resources.
20.If you are using an unsecure network and need to login to data you would like keep secure during transmission what should you do? (4 Points) Turn on Windows Firewall Remove all USB drives, update the system using the latest security updates Only access data when you are physically on site Deploy a VPN (Virtual Private Network) and use a secure tunneling protocol
21.What phrase represents Authentication best? (4 Points) Do you do what you say you will do? Are you credentialed for the level of access you need? Did you arrive at the time you said you did? Are you who you say you are?
22.Place the wireless encryptions in order from the weakest to the strongest (4 Points) WEP WPA WPA3 WPA2
23.MFA protects identities by (4 Points) Tracking the place where a login attempt occurs Monitoring the hours when a login takes place Limiting multiple attempts using a username and password Using two methods of authentication Using only one login to access multiple resources
24.What phrase represents Accounting the best? (4 Points) What did you do? Are you who you say you are? What can you do, based on who you are? Who are you?
25.What is the best example of Private Cloud? (4 Points) Microsoft Azure in a multi-tenant configuration A datacenter owned by the government that allows federated access to public vendors A cloud environment shared between the CDC and WHO A datacenter owned by Hospital.com for Hospital.com employee apps and resources Google Cloud Platform in a multi-tenant configuration
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started