What is the first step they should do to create the network vulnerability assessment plan?
Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how...
If a network is at risk from unskilled individuals, what type of threat is this?
If a network is at risk from unskilled individuals, what type of threat is this?A . External ThreatsB . Structured ThreatsC . Unstructured ThreatsD . Internal ThreatsView AnswerAnswer: C
What command will he use to check the ports applications open?
Alex is administrating the firewall in the organization's network. What command will he use to check the ports applications open?A . Netstat -anB . Netstat -oC . Netstat -aD . Netstat -aoView AnswerAnswer: A
At what layer of the OSI model does an IPsec tunnel function on?
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?A . They work on the session layer.B . They function...
What are they?
Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk factor. What are they? (Select all that apply) Risk factor =.............X...............X...........A . VulnerabilityB . ImpactC . AttackD . ThreatView...
What are the other f unction(s) of the device?
A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other f unction(s) of the device? (Select all that apply)A . Provides access memory, achieving high efficiencyB . Assigns user addressesC . Enables input/output (I/O) operationsD . Manages security keysView AnswerAnswer: B,C,D
Which type of filter will be used to detect this on the network?
Mark is monitoring the network traffic on his organization's network. He wants to detect a TCP and UDP ping sweep on his network. Which type of filter will be used to detect this on the network?A . Tcp.srcport==7 and udp.srcport==7B . Tcp.srcport==7 and udp.dstport==7C . Tcp.dstport==7 and udp.srcport==7D . Tcp.dstport==7...
What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?
The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you...
What layer of the OSI model do IPsec tunnels function on?
Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?A . The data link layerB . The session layerC . The network layerD . The...
------------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)
------------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)A . 802.15B . 802.16C . 802.15.4D . 802.12View AnswerAnswer: B