Fill This Form To Receive Instant Help
Homework answers / question archive / Saint Leo University COM 520 Chapter 9 1)A____________is a network that generally spans several city blocks
Saint Leo University
COM 520
Chapter 9
1)A____________is a network that generally spans several city blocks.
2. A local resource is any resource connected to the local LAN.
A. True
B. False
3. Which of the following devices repeats input received to all ports?
a. Switch
b. Hub
c. Gateway
d. Router
4. ______cabling provides very good protection from interference but is difficult to install.
5. Even the newest wireless protocols are slower than using high-quality physical cable.
a. True
b. False
6. Which LAN device commonly has the ability to filter packets and deny traffic based on the destination address?
a. Router
b. Gateway
c. Hub
d. Switch
7. A_________________is an untrusted network that contains Internet-facing servers and is separated from your trusted network by at least one firewall.
8. Which network device feature provides the ability to hide internal network node addresses?
a. DMZ
b. NAT
c. STP
d. OSI
9. Which network layer reference model includes four layers to describe how computers use multiple layers of protocol rules to communicate across a network?
a. IEEE
b. IPSec
c. UDP
D. TCP/IP
10. Which of the following actions is not an effective way to secure Windows services that you do not use?
A. Stop it
B. Disable it
C. Block it
D. Remove it
11. You should disable thebroadcast to make wireless networks harder to discover.
A. SSID
B. NAT
C. MAC
D. WPA
12 A successful DoS attack violates which property of the C-I-A triad?
A. Availability
B. Integrity
C. Consistency
D. Confidentiality
13. Where must sensitive data appear encrypted to ensure its confidentiality? (Select two.)
a. While in use in the workstation
b. During transmission over the network
c. As it is stored on disk
d. In memory
14. Which authentication protocol does Windows Server 2008 use as a default?
a. NTLM
b. Kerberos
c. WPA
d. NAT
15. What can some firewalls do to attempt to stop a DoS attack in progress?
a. Alert an attack responder
b. Log all traffic coming from the source of the attack
c. Terminate any connections with the source of the attack
d. Reset all connections