100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Net 455>A computer uses a dictionary of vulnerabilities in published operations and application software €27,83   In winkelwagen

Tentamen (uitwerkingen)

Net 455>A computer uses a dictionary of vulnerabilities in published operations and application software

 0 keer bekeken  0 keer verkocht
  • Vak
  • Instelling

Net 455>A computer uses a dictionary of vulnerabilities in published operations and application software

Voorbeeld 4 van de 53  pagina's

  • 30 juli 2022
  • 53
  • 2021/2022
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
avatar-seller
Net 455>A computer uses a dictionary of vulnerabilities in
published operations and application software



A computer uses a dictionary of vulnerabilities in published operations and application software
(cve.mitre.org). What is the name of this dictionary?
-CVE

A user filed a complaint with their company's helpdesk support team about threatening pop-up
messages. The messages say the user's files are encrypted due to terroristic activity and that the data
will stay encrypted until paid in bitcoin. What type of attack is the user most likely witnessing?
-Ransomware

Which type of encryption cipher is used in Wi-Fi Protected Access 2 (WPA2)? (Select all that apply.)
-Advanced Encryption Stand (AES)
-Chaining Message Authentication Code Protocol (CCMP)

A vendor visits an organization to demo a network management device. As part of the hands-on
demonstration, an IT engineer can see and manage an extended service set (ESS) on the network. Based
on the engineer's experience with the device, what is the vendor demonstrating?
-Wireless controller

A network administrator would like to setup a group of servers to retrieve the same content from a
single host on the internal network. Which of the following will allow this type of data flow? (Select all
that apply.)
-IGMP must be used to configure group membership.
-A multicast IP address is assigned to the servers.

Starting with Pin 1, what order of colored wires of a standard CAT6 network cable would make it comply
with the T568B standard?
-Orange/White, Orange, Green/White, Blue, BlueWhite, Green, Brown/White, Brown

A host uses Internet Protocol version 6 (IPv6). The host sends a
packet over the Internet using router advertisement. The IPv6
packets insert into Internet Protocol version 4 (IPv4) packets. The
packets route over the IPv4 network to their destination. What is
providing this function?
-Tunneling

A security analyst is looking at various network traffic but can't
make heads or tails of most of the packets. Which of the following
traffic would they be able to read without private keys?
-Port 110

What tool can be used to test ethernet cabling?

,-Wire map

A network consultant is installing Ethernet to a hub in the control
room. When Ethernet is wired with a hub, there needs to be a means

,of distinguishing the interface on an end system with the interface
on an intermediate system. What is the name of the end system
interface?
-MDI-X

What step of the CompTIA Network+ troubleshooting methodology
involves confirming a theory and determining the next steps to
resolve a problem?
-3

An IT engineer uses the Nmap utility to document a network. The
documentation will then help the engineer plan network
improvements. Which of the following describes the use of Nmap for
this purpose?
-Systems hardening

A cyber consultant examines the security of the control room and
evaluates the organization's maturing level and its use of
security policy and controls. What is the name of this
assessment?
-Posture assessment

A network administrator is researching network virtualization and is
trying to find a standard architecture for appliances to be developed
against. Which of these should the administrator look at for a
standard?
-NFV

A network professional is installing software onto every company
computer and phone that requires several layers of protection for
authentication. What is this called?
-Multifactor

A network consultant is conducting a test to determine the amount
of data transferred through a connection over a given period. What
is the consultant testing?
-Bandwidth

The physical security department of a bank wants to require
employees to authenticate through a locked barrier before accessing
the sensitive areas of the building, such as the IT department. If

, implemented, which of the following will best help regulate such
physical access? (Select all that apply.)
-Biometric Device
-Smart Badge

After a site survey, the network technician found the single wireless
2.4 gigahertz (Ghz) access point (AP) in a large office floor space
does not have a strong enough signal, and is contending a
significant amount of background noise and interference. What will
these findings most likely limit on the AP's wireless signal?
-They will limit the signal's range.

A multi-tenant third-party cloud service that is available via the
Internet can be described as which of the following cloud delivery
models?
-Public

A communications company uses TIA/EIA IS-95 handsets that require
each subscriber to use a code to key the modulation of their signal.
The receiver uses this "key" to extract the subscriber's traffic from
the radio signal. What type of handsets is the company using?
-CDMA

A network port does not seem to be working properly. Which of the
following tools can be used to test if the the port is sending out
data?
-Loopback plug

A computer technician is reading archived logs and identifies that
the company was using 802.11n. Not knowing what this Wi-Fi
category meant, the technician researched its origins. In recent
years, what was 802.11n renamed?
-Wi-Fi 4



Engineers survey a newly acquired set of buildings as part of an
organizational acquisition. The facilities are a few hundred yards
from one another. On-site IT staff state a fiber connection between
the buildings, but it has been very unreliable and often does not

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

√  	Verzekerd van kwaliteit door reviews

√ Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Lectjoe. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €27,83. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 75632 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€27,83
  • (0)
  Kopen