Question
Question 1 5 pts (TCO 6) What is a virtual private network? A method for remote users to connect to a network via a leased
Question 1 5 pts (TCO 6) What is a virtual private network? A method for remote users to connect to a network via a leased line A method for Internet users to connect to a network via a dedicated line A method for users at other sites to connect to a private network via the Internet A method for a remote office to connect to a private network via a leased line
Question 2 5 pts (TCO 6) Which IPSec mode enables encryption of the header and data during a VPN connection? Point-to-point encryption mode Transport mode Tunnel mode VPN encryption mode
Question 3 5 pts (TCO 7) What is the most common method by which viruses spread? By reading the e-mail address book and mailing itself to everyone listed By scanning the computer and following network connections By accessing the e-mail database and cloning sent mail By users downloading and installing unauthorized files from the Web
Question 4 5 pts (TCO 7) What is the purpose of a Trojan horse? To delete files To change registry keys To spy on a computer and report back to its origin To appear as a good program to ensure that it gets installed on a computer
Question 1 5 pts (TCO 8) The concept of hardening the operating system involves properly configuring every machine for _____ security. default firewall maximum optimum
Question 6 5 pts (TCO 8) Information and settings for all the hardware, software, users, and preferences for any Microsoft Windows computer are maintained in the Config.com file. System32 file. SystemRoot. Windows Registry.
Question 7 5 pts (TCO 9) Which is not an issue that should be covered by administrative policies? Desktop configuration E-mail attachments Software installation and removal All should be covered by administrative policies.
Question 8 5 pts (TCO 9) Which is an e-mail attachment that would be acceptable to open? It is an animation or movie. It contains active code. It comes from an unknown source. It contains an expected spreadsheet.
Question 9 5 pts (TCO 10) Which is true about written policies regarding patching systems? Audits should be performed to confirm that policies are actually being followed. Automated systems have not proven efficient in maintaining patches. Establishing written policies can ensure that patches are kept up to date. Patching should be done on a daily basis.
Question 10 5 pts (TCO 10) The only way to know of impending attacks is by installation and use of which of the following? Anti-spyware software A firewall An IDS A proxy-server
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started