Question: Question 1 (1 point) In which network device is the domains ACL stored? A. The network router B. The L3 switch C. The domain ids
Question 1 (1 point)
In which network device is the domains ACL stored?
A. The network router
B. The L3 switch
C. The domain ids
D. The domain server
Question 2 (1 point)
Which network device has been the dominant intrusion detection device in enterprise network environments?
Question 2 options:
A. Distibuted IDS
B. Router-based IDS
C. Host-based IDS
D. Network-wide IDS
Question 3 (1 point)
What is the first step in hardening a network after its operating systems and their file systems have been hardened?
Question 3 options:
|
| A. Configure ACLs on all network connectivity devices |
|
| B. Check routers, switches and firewall configurations have been changed from their default settings |
|
| C. Secure the servers to the degree called for by the organizations security policies |
|
| D. Verify the network is configured to provide security levels that meet the organizations security policies. |
Question 4 (1 point)
What type of attack exploits the three-way handshake used to initiate connections between nodes of a TCP/IP network?
Question 4 options:
|
| A. Broadcast storm attacks |
|
| B. Spoofing attacks |
|
| C. Man in the Middle attacks |
|
| D. SYN flood attacks |
Question 5 (1 point)
Using network access control strategies the local system establishes which users or groups may access files, folder or other resources.
Question 5 options:
|
| A. STAC |
|
| B. DAC |
|
| C. RBAC |
|
| D. MAC |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
