Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Saint Leo University COM 520 Chapter 9 1)A____________is a network that generally spans several city blocks

Saint Leo University COM 520 Chapter 9 1)A____________is a network that generally spans several city blocks

Computer Science

Saint Leo University

COM 520

Chapter 9

1)A____________is a network that generally spans several city blocks.

2. A local resource is any resource connected to the local LAN.

A.            True

B.            False

3.            Which of the following devices repeats input received to all ports?

a.            Switch

b.            Hub

c.             Gateway

d.            Router

4.            ______cabling provides very good protection from interference but is difficult to install.

5.            Even the newest wireless protocols are slower than using high-quality physical cable.

a.            True

b.            False

6.            Which LAN device commonly has the ability to filter packets and deny traffic based on the destination address?

a.            Router

b.            Gateway

c.             Hub

d.            Switch

7.            A_________________is an untrusted network that contains Internet-facing servers and is separated from your trusted network by at least one firewall.

8.            Which network device feature provides the ability to hide internal network node addresses?

a.            DMZ

b.            NAT

c.             STP

d.            OSI

9.            Which network layer reference model includes four layers to describe how computers use multiple layers of protocol rules to communicate across a network?

a.            IEEE

b.            IPSec

c.             UDP

D. TCP/IP

10.          Which of the following actions is not an effective way to secure Windows services that you do not use?

A.            Stop it

 

B.            Disable it

C.            Block it

D.            Remove it

11.          You should disable thebroadcast to make wireless networks harder to discover.

A.            SSID

B.            NAT

C.            MAC

D.            WPA

12           A successful DoS attack violates which property of the C-I-A triad?

A.            Availability

B.            Integrity

C.            Consistency

D.            Confidentiality

 

13.          Where must sensitive data appear encrypted to ensure its confidentiality? (Select two.)

a.            While in use in the workstation

b.            During transmission over the network

c.             As it is stored on disk

d.            In memory

14.          Which authentication protocol does Windows Server 2008 use as a default?

a.            NTLM

b.            Kerberos

c.             WPA

d.            NAT

15.          What can some firewalls do to attempt to stop a DoS attack in progress?

a.            Alert an attack responder

b.            Log all traffic coming from the source of the attack

c.             Terminate any connections with the source of the attack

d.            Reset all connections

 

 

 

 

 

 

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

2.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions