Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 5 pts (TCO 6) What is a virtual private network? A method for remote users to connect to a network via a leased

Question 1 5 pts (TCO 6) What is a virtual private network? A method for remote users to connect to a network via a leased line A method for Internet users to connect to a network via a dedicated line A method for users at other sites to connect to a private network via the Internet A method for a remote office to connect to a private network via a leased line

Question 2 5 pts (TCO 6) Which IPSec mode enables encryption of the header and data during a VPN connection? Point-to-point encryption mode Transport mode Tunnel mode VPN encryption mode

Question 3 5 pts (TCO 7) What is the most common method by which viruses spread? By reading the e-mail address book and mailing itself to everyone listed By scanning the computer and following network connections By accessing the e-mail database and cloning sent mail By users downloading and installing unauthorized files from the Web

Question 4 5 pts (TCO 7) What is the purpose of a Trojan horse? To delete files To change registry keys To spy on a computer and report back to its origin To appear as a good program to ensure that it gets installed on a computer

Question 1 5 pts (TCO 8) The concept of hardening the operating system involves properly configuring every machine for _____ security. default firewall maximum optimum

Question 6 5 pts (TCO 8) Information and settings for all the hardware, software, users, and preferences for any Microsoft Windows computer are maintained in the Config.com file. System32 file. SystemRoot. Windows Registry.

Question 7 5 pts (TCO 9) Which is not an issue that should be covered by administrative policies? Desktop configuration E-mail attachments Software installation and removal All should be covered by administrative policies.

Question 8 5 pts (TCO 9) Which is an e-mail attachment that would be acceptable to open? It is an animation or movie. It contains active code. It comes from an unknown source. It contains an expected spreadsheet.

Question 9 5 pts (TCO 10) Which is true about written policies regarding patching systems? Audits should be performed to confirm that policies are actually being followed. Automated systems have not proven efficient in maintaining patches. Establishing written policies can ensure that patches are kept up to date. Patching should be done on a daily basis.

Question 10 5 pts (TCO 10) The only way to know of impending attacks is by installation and use of which of the following? Anti-spyware software A firewall An IDS A proxy-server

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Horse Betting The Road To Absolute Horse Racing 2

Authors: NAKAGAWA,YUKIO

1st Edition

B0CFZN219G, 979-8856410593

More Books

Students also viewed these Databases questions

Question

Provide examples of KPIs in Human Capital Management.

Answered: 1 week ago

Question

What are OLAP Cubes?

Answered: 1 week ago