Which component is designed to protect against unauthorized communications to and from a computer?

Building and Securing a Small Network

Quiz
•
Computers
•
University
•
Hard
Sewer Montano
FREE Resource
72 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
security center
antimalware
antivirus
firewall
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 10 attempts 2 within 30
RouterA(config)# login block-for 30 attempts 2 within 10
RouterA(config)# login block-for 30 attempts 10 within 2
Answer explanation
COMMAND FORMAT:
login block-for <block-time> attempts <attempt-limit> within <time-period>
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the network security accounting function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack may involve the use of tools such as nslookup and fping?
access attack
worm attack
reconnaissance attack
denial of service attack
Answer explanation
A Reconnaissance Attack is like the “scouting phase” of hacking. The attacker tries to gather as much information as possible about the target network before launching an actual attack.
nslookup → Used to query DNS and find out IP addresses or domain names.
fping → A faster version of ping used to scan networks for active devices.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match each weakness with an example:
security policy weakness
The network administrator did not fully consider the implications of unauthorized users accessing the network.
When implementing an access list on a router, a network engineer did not filter a type of malicous traffic.
A network engineer is examining the operating system of a network device for vulnerabilities.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match each weakness with an example:
configuration weakness
The network administrator did not fully consider the implications of unauthorized users accessing the network.
When implementing an access list on a router, a network engineer did not filter a type of malicous traffic.
A network engineer is examining the operating system of a network device for vulnerabilities.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match each weakness with an example:
technological weakness
The network administrator did not fully consider the implications of unauthorized users accessing the network.
When implementing an access list on a router, a network engineer did not filter a type of malicous traffic.
A network engineer is examining the operating system of a network device for vulnerabilities.
Create a free account and access millions of resources
Similar Resources on Wayground
69 questions
NET1L - Lesson 6 (Data Link Layer)

Quiz
•
University
70 questions
i-Tech Quiz

Quiz
•
University
76 questions
Lesson 2 - Operating System

Quiz
•
University
70 questions
Computing A level AQA

Quiz
•
12th Grade - University
70 questions
Network+ Assessment Quiz Edu

Quiz
•
University
75 questions
OCR L3 Cam Tech Unit 1 Fundamentals of IT

Quiz
•
University
67 questions
Object Oriented Programming

Quiz
•
University
74 questions
Firewalls and Network Security Study Guide Midterm

Quiz
•
University
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade