Join the discussion
Question 1/100
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?
Correct Answer: A
Add Comments
- Other Question (100q)
- Q1. Which of the following VPN topologies establishes a persistent connection between an organ...
- Q2. An administrator wants to monitor and inspect large amounts of traffic and detect unauthor...
- Q3. Which of the following steps will NOT make a server fault tolerant? Each correct answer re...
- Q4. Kelly is taking backups of the organization's data. Currently, he is taking backups of onl...
- Q5. Which of the following is the best way of protecting important data against virus attack?...
- Q6. Which of the following attacks, the attacker cannot use the software, which is trying a nu...
- Q7. James wants to implement certain control measures to prevent denial-of-service attacks aga...
- Q8. Which of the following tools is a free laptop tracker that helps in tracking a user's lapt...
- Q9. Which of the following is a communication protocol that multicasts messages and informatio...
- Q10. Which of the following provide an "always on" Internet access service when connecting to a...
- Q11. CORRECT TEXT Fill in the blank with the appropriate term. ______________is a free open-sou...
- Q12. Which of the following systems is formed by a group of honeypots?...
- Q13. ------------is a group of broadband wireless communications standards for Metropolitan Are...
- Q14. Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solut...
- Q15. Which field is not included in the TCP header?...
- Q16. Which of the following strategies is used to minimize the effects of a disruptive event on...
- Q17. Eric is receiving complaints from employees that their systems are very slow and experienc...
- Q18. Which of the following network devices operate at the network layer of the OSI model? Each...
- Q19. Which of the following policies helps in defining what users can and should do to use netw...
- Q20. You are Network Administrator Investment Bank. You're worried about people breeching netwo...
- Q21. Which of the following statements are NOT true about the FAT16 file system?Each correct an...
- Q22. Which of the following is also known as slag code?...
- Q23. John is a senior network security administrator working at a multinational company. He wan...
- Q24. Which of the following tools is described below? It is a set of tools that are used for sn...
- Q25. Which of the following attacks is a class of brute force attacks that depends on the highe...
- Q26. You work as a Network Security Analyzer. You got a suspicious email while working on a for...
- Q27. Larry is responsible for the company's network consisting of 300 workstations and 25 serve...
- Q28. Management decides to implement a risk management system to reduce and maintain the organi...
- Q29. Which of the following types of information can be obtained through network sniffing? (Cho...
- Q30. Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blog...
- Q31. You are Network Administrator Investment Bank. You're worried about people breeching netwo...
- Q32. John wants to implement a packet filtering firewall in his organization's network. What TC...
- Q33. Which command list all ports available on a server?...
- Q34. Adam works as a Security Analyst for Umbrella Inc. The company has a Linux-based network c...
- Q35. Chris is a senior network administrator. Chris wants to measure the Key Risk Indicator (KR...
- Q36. Which of the following are the six different phases of the Incident handling process? Each...
- Q37. The bank where you work has 600 windows computers and 400 Red Hat computers which primaril...
- Q38. What is the bit size of the Next Header field in the IPv6 header format?...
- Q39. Which of the following are the six different phases of the Incident handling process? Each...
- Q40. With which of the following flag sets does the Xmas tree scan send a TCP frame to a remote...
- Q41. Harry has sued the company claiming they made his personal information public on a social ...
- Q42. Which of the following is a management process that provides a framework to stimulate a ra...
- Q43. Identify the password cracking attempt involving precomputed hash values stored as plainte...
- Q44. Fill in the blank with the appropriate term. ______________is a free open-source utility f...
- Q45. John is a network administrator and is monitoring his network traffic with the help of Wir...
- Q46. Which of the following RAID storage techniques divides the data into multiple blocks, whic...
- Q47. Which of the following refers to a potential occurrence of an undesired event that can eve...
- Q48. Which of the following are the responsibilities of the disaster recovery team?Each correct...
- Q49. DRAG DROP Drag and drop the Response management plans to match up with their respective pu...
- Q50. Which of the following IEEE standards defines the demand priority access method?...
- Q51. What is the response of an Xmas scan if a port is either open or filtered?...
- Q52. Which of the following attacks comes under the category of an active attack?...
- Q53. Jason works as a System Administrator for www.company.com Inc. The company has a Windows-b...
- Q54. Which of the following policies is a set of rules designed to enhance computer security by...
- Q55. Which of the following protocols is described as a connection-oriented and reliable delive...
- Q56. A newly joined network administrator wants to assess the organization against possible ris...
- Q57. Which of the following is a network maintenance protocol of the TCP/IP protocol suite that...
- Q58. Fill in the blank with the appropriate term. A ______________ is a set of tools that take ...
- Q59. According to the company's security policy, all access to any network resources must use W...
- Q60. Which of the following is a non-profit organization that oversees the allocation of IP add...
- Q61. Fill in the blank with the appropriate term. ______________ is an enumeration technique us...
- Q62. Which of the following protocols is a method of implementing virtual private networks?...
- Q63. Fill in the blank with the appropriate term. The _____________is an application layer prot...
- Q64. Which of the following types of RAID offers no protection for the parity disk?...
- Q65. Which of the following is virtually unsolicited e-mail messages, often with commercial con...
- Q66. Which of the following tools is an open source network intrusion prevention and detection ...
- Q67. Which of the following representatives of the incident response team takes forensic backup...
- Q68. Which of the following is a management process that provides a framework for promoting qui...
- Q69. Mark is monitoring the network traffic on his organization's network. He wants to detect a...
- Q70. Which of the following ranges of addresses can be used in the first octet of a Class B net...
- Q71. Fill in the blank with the appropriate term. _______________is the complete network config...
- Q72. Which of the following OSI layers defines the electrical and physical specifications for d...
- Q73. Which of the following are provided by digital signatures?...
- Q74. Which of the following UTP cables uses four pairs of twisted cable and provides transmissi...
- Q75. Which of the following UTP cables supports transmission up to 20MHz?...
- Q76. Which of the following applications is used for the statistical analysis and reporting of ...
- Q77. A company has the right to monitor the activities of their employees on different informat...
- Q78. Which of the following layers of the OSI model provides end-to-end connections and reliabi...
- Q79. The company has implemented a backup plan. James is working as a network administrator for...
- Q80. Which of the following is an open source implementation of the syslog protocol for Unix?...
- Q81. Which of the following policies helps in defining what users can and should do to use netw...
- Q82. You are monitoring your network traffic with the Wireshark utility and noticed that your n...
- Q83. During the recovery process, RTO and RPO should be the main parameters of your disaster re...
- Q84. Which of the following standards is an amendment to the original IEEE 802.11 and specifies...
- Q85. Which of the following organizations is responsible for managing the assignment of domain ...
- Q86. Larry is responsible for the company's network consisting of 300 workstations and 25 serve...
- Q87. Identify the minimum number of drives required to setup RAID level 5. (Exhibit)...
- Q88. Which of the following policies is a set of rules designed to enhance computer security by...
- Q89. Jason works as a System Administrator for www.company.com Inc. The company has a Windows- ...
- Q90. You work as a Network Security Analyzer. You got a suspicious email while working on a for...
- Q91. Which of the following is a worldwide organization that aims to establish, refine, and pro...
- Q92. Which of the following is designed to detect the unwanted presence of fire by monitoring e...
- Q93. Which of the following protocols supports source-specific multicast (SSM)?...
- Q94. Which of the following is a 16-bit field that identifies the source port number of the app...
- Q95. Which of the following is an attack on a website that changes the visual appearance of the...
- Q96. Which of the following protocols permits users to enter a user-friendly computer name into...
- Q97. Which of the following is a process that detects a problem, determines its cause, minimize...
- Q98. What is the location of honeypot on a network?...
- Q99. FILL BLANK Fill in the blank with the appropriate term. A _______________device is used fo...
- Q100. Which of the following protocols is a more secure version of the Point-to-Point Tunneling ...
