Question: Question 11 (1 point) In a segmented network, what types of devices are employed between segments to act as entry and exit points for each
Question 11 (1 point)
In a segmented network, what types of devices are employed between segments to act as entry and exit points for each subnet?
Question 11 options:
|
| A. Proxies |
|
| B. Firewalls |
|
| C. Servers |
|
| D. Gateways |
Question 12 (1 point)
What type of network device is typically responsible for providing user authentication functions?
Question 12 options:
|
| A. Biometric devices |
|
| B. Routers |
|
| C. Network servers |
|
| D. Local host devices |
Question 13 (1 point)
As an administrator, what activity can be used to detect that a users work station has been attacked by a virus that escalates the users privileges?
Question 13 options:
|
| A. Installing a network-based Intrusion Detection System |
|
| B. Performing user privilege auditing |
|
| C. Performing Security Log checks at the server |
|
| D. Implement Least Privilege settings for all network users |
Question 14 (1 point)
If a given file in a Linux system has been assigned the following permissions drwxrwr - which of the following correctly describes the results?
Question 14 options:
|
| A. owner user read/write/execute), owner group (read/execute), other users (write/execute) |
|
| B. owner user (read/write/execute), owner group (read/write), other users (write) |
|
| C. owner user (delete/read/write/execute), owner group (write/execute), other users (execute) |
|
| D. owner user (read/write/execute), owner group (read/write), other users (read ) |
Question 15 (1 point)
What portion of a managed switch provides attackers with the best target for exploiting a given network?
Question 15 options:
|
| A. Its route table |
|
| B. Its MAC address table |
|
| C. Its hop table |
|
| D. Its IP address table |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
