CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • A+
          • Cloud Essentials
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
          • Storage+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • TCP-IP
          • IP Subnetting
          • IPv6 Network Associate
          • IPv6 Network Professional
          • IPv6 Network Expert
        • Career
          • How to Break into IT
          • IT Freelancing/Contracting
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC1 Exam 101
          • Linux LPIC1 Exam 102
        • VMware
          • VCA Data Center
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNP ENARSI
          • CCNP ENCOR Primer
          • CCNP ENCOR
          • CyberOps Associate
          • DevNet Associate
        • Google
          • Cloud Architect
        • Microsoft
          • MTA Database
          • MTA Python
          • MTA Windows 10
          • MTA Server
          • MTA Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • Wireshark
          • WCNA
        • Cloud Computing
          • Amazon AWS Associate
          • AWS Sysops Associate
          • CompTIA Cloud Essentials
          • Google Cloud Architect
          • Azure Fundamentals
          • Azure Administrator
        • ITIL
          • ITIL Foundations
        • Security
          • Cisco CyberOps Associate
          • CompTIA Security+
          • Certified Ethical Hacker
          • Juniper JNCIA-SEC
          • Juniper JNCIS-SEC
          • Microsoft MTA Security
        • Web Development
          • PhP Fundamentals
          • CSS Fundamentals
          • HTML Fundamentals
          • MySQL Fundamentals
          • JavaScript Fundamentals
          • Learn Python From Scratch
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
    • My Products
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • A+
          • Cloud Essentials
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
          • Storage+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • TCP-IP
          • IP Subnetting
          • IPv6 Network Associate
          • IPv6 Network Professional
          • IPv6 Network Expert
        • Career
          • How to Break into IT
          • IT Freelancing/Contracting
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC1 Exam 101
          • Linux LPIC1 Exam 102
        • VMware
          • VCA Data Center
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNP ENARSI
          • CCNP ENCOR Primer
          • CCNP ENCOR
          • CyberOps Associate
          • DevNet Associate
        • Google
          • Cloud Architect
        • Microsoft
          • MTA Database
          • MTA Python
          • MTA Windows 10
          • MTA Server
          • MTA Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • Wireshark
          • WCNA
        • Cloud Computing
          • Amazon AWS Associate
          • AWS Sysops Associate
          • CompTIA Cloud Essentials
          • Google Cloud Architect
          • Azure Fundamentals
          • Azure Administrator
        • ITIL
          • ITIL Foundations
        • Security
          • Cisco CyberOps Associate
          • CompTIA Security+
          • Certified Ethical Hacker
          • Juniper JNCIA-SEC
          • Juniper JNCIS-SEC
          • Microsoft MTA Security
        • Web Development
          • PhP Fundamentals
          • CSS Fundamentals
          • HTML Fundamentals
          • MySQL Fundamentals
          • JavaScript Fundamentals
          • Learn Python From Scratch
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
    • My Products
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets

Module 21 Exam

Back to Main Page

1. These three attributes are the core of the enterprise security policy.

Question 1 of 23

2. The main purpose of a Denial of Service (DoS) attack is to quietly take control of an end device without the user knowing.

Question 2 of 23

3. With a Denial of Service (DoS) attack, the attacker does not try to gain access to a resource; rather, he tries to induce a loss of access to different users or services. These services include?

Question 3 of 23

4. An advanced form of DoS attack is _____, which works by manipulating a large number of systems to launch an attack on a target over the Internet or
over an enterprise network.

Question 4 of 23

5. A ______ attack is the process in which a single host or entity falsely assumes (spoof) the identity of another host.

Question 5 of 23

6. Programs like Telnet and FTP employ user-based authentication but the credentials are sent in clear text (unencrypted) over the wire.

Question 6 of 23

7. There are three major types of viruses, depending on where they act:

Question 7 of 23

8. Another way to categorize viruses is based on their behavior, of which there are two types:

Question 8 of 23

9. _____ programs are basically unauthorized code that is contained in legitimate programs and performs functions that are hidden to the user.

Question 9 of 23

10. Social engineering attacks are difficult to identify because they are not electronically detectable.

Question 10 of 23

11. Some of the most important actions that can be taken against social engineering attacks are:

Question 11 of 23

12. ______ is the process of finding available wireless access points within a certain geographical area by driving around and listening for signals.

Question 12 of 23

13. WPA2-Personal is vulnerable to a series of attacks, including:

Question 13 of 23

14. _______ describes a concept of configuring an external access point to look and behave just like a trusted access point (same SSID and same security settings) so that users connect to the “evil” AP by mistake.

Question 14 of 23

15. DoS and DDoS attacks are meant to compromise the connectivity and availability to or from the network and can be categorized into different types:

Question 15 of 23

16. Trust and identity management has three components.

Question 16 of 23

17. The authentication of identity is based on three attributes that make the connection to access control:

Question 17 of 23

18. Th e Public Key Infrastructure (PKI) is a complex authentication technique that functions by using digital certificates.

Question 18 of 23

19. Kerberos has three main components:

Question 19 of 23

20. AAA offers the following services:

Question 20 of 23

21. RADIUS functions over ___, while TACACS+ uses ___.

Question 21 of 23

22. 802.1X works by authenticating the user before receiving access to the network, and this involves three components:

Question 22 of 23

23. Lightweight EAP (LEAP) was created by Cisco as a proprietary solution for their equipment and systems.

Question 23 of 23

Loading... Loading...

 

About Us

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

Most Popular

Cisco CCNA Wireshark WCNA Certified Ethical Hacker CompTIA Network+ CyberOps Associate Microsoft MTA OS Fundamentals

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Free IT Webinar Training

Secure Site

website security

Copyright Reality Press Ltd . / Paul Browning