Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
The process of reviewing records of network computer activity is called which of the following?a. monitoring c. auditing
b. archiving d. recording
Answer
This answer is hidden. It contains 1 characters.
Related questions
Q:
Which of the following is true about encryption algorithms?a. their strength is tied to their key length b. not vulnerable to brute force attacks c. block ciphers encrypt one bit at a timed. asymmetric algorithms use a single key
Q:
Describe antispoofing logging and how you can prevent it with ACLs.
Q:
Define route summarization.
Q:
What is a distance-vector routing protocol? Give one example.
Q:
Rather than using classful routing, ________________ subnet masks allow you to divide your network into different sizes to make better use of available addresses.
Q:
An ARP broadcast is sent to the local subnet in an attempt to discover the destination computer's ______________ address.
Q:
During the routing process, the router strips off ______________________ layer header information and then examines the Network layer address.
Q:
Which of the following is true about ACLs on Cisco routers?a. there is an implicit deny any statement at the end of the ACL b. there is an explicit permit any statement at the beginning of the ACL c. ACLs are processed in reverse order so place high priority statements lastd. ACLs bound to an interface apply to inbound and outbound traffic by default
Q:
Which of the following makes routing tables more efficient?a. route summarization c. CIDRb. VLSM d. host routing
Q:
Some methods of attacking a Cisco router do not require knowledge of the IOS version, so software patching is recommended.
Q:
Describe in detail the first three packets you would see in an FTP session between client 192.168.1.132 and server 192.168.1.110; include port numbers, flags, and any other pertinent options that would be set.
Q:
What is the sequence of packets for a successful three-way handshake?a. SYN, ACK, ACK c. SYN, SYN ACK, ACKb. SYN, SYN ACK, RST d. SYN, ACK, FIN
Q:
Which TCP flag can be the default response to a probe on a closed port?a. RST c. PSHb. URG d. SYN
Q:
What is the term used when an IDPS doesn"t recognize that an attack is underway?a. false negative c. negative activityb. true positive d. positive signature
Q:
Newer Trojans listen at a predetermined port on the target computer so that detection is more difficult.
Q:
Describe the three-way handshake.
Q:
List three reasons an administrator would want to use subnetting.
Q:
What are the three private IP address ranges and their associated subnet masks?
Q:
List the three classes of IP address that can be assigned to network devices and their corresponding first octet range of values.
Q:
List the seven layers of the OSI model.
Q:
The ____________ command shows current sessions with associated port numbers.
Q:
________________ IPv6 addresses are used for one-to-one or one-to-many communication.
Q:
The ______________________ is the part of the IP address that is the same among computers in a network segment.
Q:
DNS operates at the _________________ layer of the OSI model.
Q:
Which of the following is a valid IPv6 address?a. 5BA4:2391:0:0:4C3E b. 1080::8:800:200C:417A c. 24::5B1A::346Cd. 5510:ABCD::34:1::2
Q:
How large is the IPv6 address space?a. 32 bits b. 128 bits c. 64 bitsd. 168 bits
Q:
Which of the following is the first packet sent in the TCP three-way handshake?a. RST b. SYN c. ACKd. PSH
Q:
Which of the following is a reason that UDP is faster than TCP?
a. it doesn"t use port numbers c. the header is smaller
b. it has a higher priority on the network d. it doesn"t guarantee delivery
Q:
What is the TCP portion of a packet called?a. frame b. data c. segmentd. header
Q:
Which of the following is considered a flooded broadcast IP address?a. 200.15.6.255 b. 10.255.255.255 c. 255.255.255.255d. FFFF.FFFF.FFFF