Question: Question 1 (1 point) In which network device is the domains ACL stored? A. The network router B. The L3 switch C. The domain ids

Question 1 (1 point)

In which network device is the domains ACL stored?

A. The network router

B. The L3 switch

C. The domain ids

D. The domain server

Question 2 (1 point)

Which network device has been the dominant intrusion detection device in enterprise network environments?

Question 2 options:

A. Distibuted IDS

B. Router-based IDS

C. Host-based IDS

D. Network-wide IDS

Question 3 (1 point)

What is the first step in hardening a network after its operating systems and their file systems have been hardened?

Question 3 options:

A. Configure ACLs on all network connectivity devices

B. Check routers, switches and firewall configurations have been changed from their default settings

C. Secure the servers to the degree called for by the organizations security policies

D. Verify the network is configured to provide security levels that meet the organizations security policies.

Question 4 (1 point)

What type of attack exploits the three-way handshake used to initiate connections between nodes of a TCP/IP network?

Question 4 options:

A. Broadcast storm attacks

B. Spoofing attacks

C. Man in the Middle attacks

D. SYN flood attacks

Question 5 (1 point)

Using network access control strategies the local system establishes which users or groups may access files, folder or other resources.

Question 5 options:

A. STAC

B. DAC

C. RBAC

D. MAC

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!