Question: Show A) totally unique A)* and Question: A) MAC filter A)*Explanation: You may use a MAC filter to filter the MAC addresses of wireless clients that are allowed to connect Question: A) MAC filter B)*Explanation: A flood guard is a protection feature built into many firewalls that allows the administrator to tweak Question: A) Dipole A)*Explanation: Talking about antenna types, a dipole antenna has two identical conductive elements bilaterally Question: A) False A)* FalseExplanation: Firewall configuration, administration and operational procedures should be documented. Question: A) WTLS C)*Explanation: The Wireless Transaction Protocol (WTP) provides services similar to TCP and UDP for WAP. Question: A) IMAP D)*Explanation: SFTP uses only TCP ports. IMAP, LDAP, and FTPS all use both TCP and UDP ports. Question: A) WEP C)*Explanation: Wireless Application Protocol (WAP) is an open international standard for applications that use Question: A) Multitenancy B)*Explanation: Elasticity is a feature of cloud computing that involves dynamically provisioning (or deprovisioning) Question: A) TKIP B)*Explanation: The term network lock is synonymous with MAC filtering. Question: A) All the latest patches are applied. A)* Explanation: Routing takes place at layer 3. If it is compromised, then your network will be in great danger. You Question: Remote access allows your users to dial in from any place that has: A) a normal phone connection A)*Explanation: Remote access allows your users to dial in from any place that has a normal phone connection. Once Question: A) RAID 0+1 B)*Explanation: RAID 6 writes parity to two different drives, thus providing fault tolerance to the system even in the Question: A) spam filter software A)*Explanation: To protect against email spamming, you should install spam filter software, and consider removing Question: A) Risk acceptance E)*Explanation: Risk transference involves sharing some of the risk burden with someone else, such as an insurance Question: A)* IPSec All*Explanation: A protocol is a language that both hosts must follow in order to communicate. The different available Question: Which of the following are multiport devices that improve network efficiency? A) Switches A)*Explanation: Switches are multiport devices that improve network efficiency. A switch typically has a small Question: A) DDOS attacks A)*Explanation: Distributed denial of service (DDOS) uses a large number of compromised hosts to flood a target Question: A) Determining the number and placement of APs for providing adequate coverage. A)*Explanation: A site survey has the goal of determining the number and placement of APs for providing adequate Question: A) Risk acceptance A)*Explanation: Risk acceptance necessitates an identified risk that those involved understand the potential cost or Question: A) subnetting A)* Explanation: With a router, hosts attached to the router ports are not on the same subnet. This is about Question: A) SFTP A)* SFTP Question: What can be used to offer an extra layer of protection on the network for those hosts running behind the firewall? A) DMZ A)*Explanation: A demilitarized zone (DMZ) is a small IP subnetwork. It sits between the trusted internal LAN and Question: A) Arithmetical D)*Explanation: A heuristic system uses algorithms to analyze the traffic passing through the network. Question: A) Public and community B)*Explanation: While a hybrid cloud could be any mixture of cloud delivery models, it is usually a combination of Question: A) IPSec A)*Explanation: IPSec provides network security for tunneling protocols. IPSec can be used with many different Question: A) WAP C)*Explanation: Wi-Fi Protected Access 2 (WPA2) was intended to provide security that's equivalent to that on a Question: A) Proxy C)*Explanation: A load balancer can be implemented as a software or hardware solution and is usually associated Question: A) Packet sniffing A)*Explanation: When the interconnection between the WAP server and the Internet isn't encrypted, packets between Question: A) specific to the object you are trying to create. A)*Explanation: A fundamental means of enforcing privilege separation and controlling access are access control lists Question: A) Snapshot A)*Explanation: A snapshot is a method of capturing a virtual machine at a given point in time. Question: A) TKIP A)*Explanation: WPA is a stronger form of wireless security than WEP because it uses Temporal Key Integrity Question: A) Private A)*Explanation: A private cloud delivery model is implemented by a single organization and can be implemented Question: A) Hub B)*Explanation: Switches create virtual circuits between systems in a network. These virtual circuits are somewhat Question: A) Polarization A)*Explanation: The manner in which electromagnetic wave moves may be determined by polarization. Vertical Question: A) PNAC A)*Explanation: 802.1X is an IEEE standard that provides Port-based Network Access Control (PNAC). It makes use Question: A) Prevents unauthorized packets from entering the network A)*Explanation: Packet filters prevent unauthorized packets from entering or leaving a network. Packet filters are a Question: A) they can correct traffic jam problems A)*Explanation: A hub gathers groups of nodes together. A switch is better than a hub as it can correct traffic jam Question: C)*Explanation: The risk-assessment component, in conjunction with the business impact analysis (BIA), provides an Question: A) ios D)*Explanation: The dBi number indicates the amount of gain the antenna offers. Question: A) False A)* FalseExplanation: NIDS can inspect inbound and outbound network activity and identify suspicious patterns that may Question: A) Policies C)*Explanation: Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than Question: A) Private D)*Explanation: The hybrid delivery model can be considered an amalgamation of other types of delivery models. Question: What technology is used to simplify network setup by allowing a router to have the administrator push a button on A) WEP D)*Explanation: WPS (Wi-Fi Protected Setup) is intended to simplify network setup for home and small offices. Question: A) To try to make sense out of the captured traffic. A)*Explanation: You want to capture unicast, multicast and broadcast traffic and perform log analysis - you do this to Question: A) False A)*Explanation: WPA can provide payload integrity, but it does not use Advanced Encryption Standard (AES). It is Question: A) Loaded C)*Explanation: Clustered systems utilize parallel processing (improving performance and availability) and add What's the recommended way to protect a WPA2 network check all that apply quizlet?What's the recommended way to protect a WPA2 network? Check all that apply. use a long, complex passphrase; Because the SSID is used as a salt, it should be something unique to protect against rainbow table attacks. A long, complex password will protect against brute-force attacks.
What are some of the weaknesses of the WEP scheme check all?- Its use of RC4 stream cipher. The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure.
What's the recommended way to protect a WPA2?5 Tips on Ways to Improve WPA2 Security. Keep your devices patched and up to date. ... . Use strong and unique passwords with a greater password length. ... . Ensure that no default credentials are used on any of the access points (such as admin credentials on a router).. Which encryption algorithm does WPA2 use?WPA uses TKIP and WPA2 uses the AES algorithm.
|