a. the customers who use the system
b. the organization and its employees
c. business partners who access the network
d. all of the above
d. all of the above
a. audit
b. security
c. authentication
d. acceptable use
c. authentication
a. how difficult it would be to enforce a password policy
b. the costs to implement a security system
c. whether the data is important enough to safeguard
d. from whom the data needs to be protected
a. how difficult it would be to enforce a password policy
a. 8
b. 16
c. 64
d. 128
d. 128
a. NetWoRKing
b. NetworkingIsFun
c. N3tworking1O1
d. netw@rk!ngb@s!cs
c. N3tworking1O1
a. Kerberos authentication
b. digital certificate
c. GNC privacy guard
d. preshared key
d. preshared key
a. transport mode
b. USB key mode
c. user authentication mode
d. encryption mode
b. USB key mode
a. network policy and access services
b. Active Directory services
c. domain name services
d. remote network services
a. network policy and access services
a. SSTP
b. IPSec
c. PPTP
d. L2TP
a. SSTP
a. IPSec
b. NAT
c. EFS
d. VPN
b. NAT
a. spyware
b. malware
c. virus
d. Trojan
b. malware
a. rootkit
b. Trojan
c. hoax virus
d. spyware
a. rootkit
a. rootkit
b. Trojan
c. hoax virus
d. spyware
d. spyware
a. WEP
b. WAP
c. WPA
d. WPA2
d. WPA2
a. Port
b. Protocol
c. Ping
d. Finger
a. Port
a. packet storm
b. broadcast flood
c. smurf attack
d. half-open SYN attack
c. smurf attack
a. It determines the path used based on the destination IP address
b. It sends broadcast frames out all connected ports
c. Each port on a switch represents a separate collision domain
d. Switches have the ability to operate in full-duplex mode
a. It determines the path used based on the destination IP address
a. application/destination port number
b. IP address/exit interface
c. destination network/next Hop
d. MAC address/switch port number
d. MAC address/switch port number
a. intuitive
b. executive
c. smart
d. enterprise
c. smart
a. the ability to stop switching loops using STP
b. the ability to transfer it’s switching table with neighboring switches
c. the creation of VLANS to logically separate resources
d. to limit access to the network by enabling security on individual ports
b. the ability to transfer it’s switching table with neighboring switches
a. network ID
b. default gateway
c. MAC address
d. serial number
c. MAC address
a. multi-homed router
b. dynamic router
c. link-state router
d. router on a stick
d. router on a stick
a. distance-state protocol
b. link-state protocol
c. hybrid protocol
d. distance-vector protocol
d. distance-vector protocol
a. delivery
b. convergence
c. congestion
d. concurrence
b. convergence