Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is a process of monitoring data packets that travel across a network?

A.

Packet sniffing

B.

Packet filtering

C.

Shielding

D.

Password guessing

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

A.

False

B.

True

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

A.

The site's Web server has heavy traffic.

B.

WINS server has no NetBIOS name entry for the server.

C.

DNS entry is not available for the host name.

D.

The site's Web server is offline.

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

A.

Implement a proxy server on the network.

B.

Implement firewall on the network.

C.

Connect a router to the network.

D.

Connect a brouter to the network.

Which of the following activities is used to take place after recording and registering an incident?

A.

Restoring

B.

Matching

C.

Analysis

D.

Classification

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

A.

PPP

B.

TCP

C.

EAP

D.

TLS

The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?

A.

15

B.

13

C.

10

D.

21

E.

18

Which of the following law does not protect intellectual property?

A.

Murphy's law

B.

Patent law

C.

Trademark

D.

Copyright

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

A.

Bridge

B.

Antivirus software

C.

Gateway

D.

Firewall

Which of the following statements about Network Address Translation (NAT) is true?

A.

It hides the public network from internal hosts.

B.

It hides internal hosts from the public network.

C.

It uses public IP addresses on an internal network.

D.

It translates IP addresses into user friendly names.

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

A.

transport

A ________ is a detailed step-by-step document that explains exactly what is to be done.

A.

Procedure

B.

Baseline

C.

Standard

D.

Rule

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.

A.

64,128

The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?

A.

15

B.

13

C.

10

D.

21

E.

18

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

A.

DNS server

B.

Firewall

C.

Proxy server

D.

WINS server