Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 Devaki is an engineer who is designing network security for her company's infrastructure. She is incorporating protections for programming flaws, default settings, maximum

Question 1

Devaki is an engineer who is designing network security for her company's infrastructure. She is incorporating protections for programming flaws, default settings, maximum values, processing capabilities, and memory capacities on devices, as well as malicious code and social engineering. This type of protection is known as _____ _____ _____.

(Answer using all lowercase letters).

Question 2

The chief information officer (CIO) of a large company has been informed by the board of directors that their corporation is anticipating rapid growth over the next two years. She calculates the contingency of building additional capacity into the current network infrastructure. Based on the board's growth estimates, what percentage of additional capacity should she plan for?

A. 20 percent

B. More than 50 percent

C. 30 percent

D. 10 percent

Question 3

The network engineer of a mid-size company needs to have all servers, network printers, and other online resources possess the same IPv6 address over time. The engineer does not want to perform manual address assignments on all of these resources. Additionally, she wants to prevent any rogue device from having an IPv4 address dynamically assigned just by making the request. What is her solution?

A. Using static addressing and a hardware firewall

B. Static addressing of the most vital network resources

C. Dynamic Host Configuration Protocol (DHCP) reservation

D. Dynamic Host Configuration Protocol (DHCP)

Question 4

Nicolau is a network engineer for a large online retailer. He is concerned about the security of his company's network connections to its customers, vendors, and partners. Although all of these sources are generally trusted, he knows they can be hacked by malicious parties and used to steal confidential company data. Which network-based solution should he choose to detect unauthorized user activity and attacks that is also capable of taking action to prevent a breach?

A. Data encryption

B. Intrusion detection system/intrusion prevention system (IDS/IPS)

C. Firewall

D. Router anti-tampering

Question 5

Gino is an ethical hacker hired as a consultant to test the security of a mid-sized company's network. As part of his assignment, he has been given physical access to the system. He has built a dictionary of hashed passwords from the hard drive of the device. Which type of attack is he planning to launch?

A. Brute force

B. Dictionary

C. Hybrid

D. Rainbow

Question 6

Santiago is a new network engineer for a mid-sized company. It is his responsibility to ensure that all employees working from home are able to connect to the office network in an efficient and secure manner. He must provide a service that allows communications between out-of-office staff and network resources to be encrypted at the protocol level and to be performed by either client or server software. The solution must also ensure that even if protocol encryption fails, the data is safe by its own encryption. What solution does he select?

A. Implementation of a demilitarized zone (DMZ)

B. Identity and access management (IAM)

C. Virtual private network (VPN)

D. Authentication, authorization, and accounting (AAA)

Question 7

Regarding the processes of risk assessment and risk management, the statistic that calculates the potential number of times the threat could be a realized attack in a year's time is known as the _____ _____ _____ _____.

(Answer using all lowercase letters).

Question 8

_____ _____ is money paid or an investment made in the past.

(Answer using all lowercase letters).

Question 9

An IPv6 address consists of ___ bits; an IPv4 address consists of ___ bits.

Question 10

Regarding multifactor authentication, facial geometry is an example of something you _____.

(Answer using all lowercase letters).

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Describe some of the ways that sexual development varies.

Answered: 1 week ago