We've found 67 Network Security tests

Network Security Simple Mail Transfer Protocol Software
OS Hardening SEC340 – Chapter 9 ; 10 – Flashcards 40 terms
Robert May avatar
Robert May
40 terms
Which of these is NOT part of the makeup of the AAA elements in network security?
determining user need (analyzing)
More test answers on https://studyhippo.com/chapter-6-7-8-9-10-and-11-unit-02-exam/
Which of the following describes how access lists can be used to improve network security?
An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.
More test answers on https://studyhippo.com/7/
12. What are the two basic Windows 8 settings for network security?
Public and Private
More test answers on https://studyhippo.com/chapter-7-review-2/
Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following: * Server systems are kept in a locked server room * User accounts on desktop systems have strong passwords assigned * A locked door is used to control access to the work area. Users must use ID badges to enter the area * Users connect their personal mobile devices to their computers using USB cables * Users work in three 8-hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use Based on this information, what should you recommend your client do to increase security? a. Move the server systems to an empty cubicle in the work area. b. Assign users easy-to-remember simple passwords so they won’t be tempted to write them down c. Disable the USB ports on users workstations d. Provision each employee with their own computer system.
Disable the USB ports on users workstations
More test answers on https://studyhippo.com/section-12-8-network-security/
Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following: • Server systems are kept in a locked server room. • User accounts on desktop systems have strong passwords assigned. • A locked door is used to control access to the work area. Users must use ID badges to enter the area. • Users connect their personal mobile devices to their computers using USB cables. • Users work in three 8hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use. Based on this information, what should you recommend your client do to increase security?
Disable the USB ports on user’s workstations.
More test answers on https://studyhippo.com/test-out-pc-pro-chapter-12-practice-questions-answers-answers-for-final/
False positives do not compromise network security
Which of the following is true about the steps in setting up and using an IDPS?
More test answers on https://studyhippo.com/ctc-452-quiz-6/
Threats to Network Security: Industrial Espionage
Proprietary information is often valuable enough that it can be sold to competing companies or other parties.
More test answers on https://studyhippo.com/network-defense-ch-1-2-31619/
all in one network security appliance
Network hardware that provides multiple security functions
More test answers on https://studyhippo.com/chapter-6-10/
A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO). A. Install additional antivirus software B. Disable screen savers C. Conduct a daily security audit D. Assign security rights based on job roles E. Use strong passwords
____ threats are network security threats that originate from within a network.
Interior
More test answers on https://studyhippo.com/cmis-108-chapter-6/
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New