Topics
Products
Follow Us:
Sebastiano
Answered: Mar 30, 2020
Port Mirroring

The port mirroring feature of a network switch is designed to send a copy of any data destined for a group of ports to a monitored port. The network administrator connects...Read More

1 Answer

212 views
Wyatt Williams
Answered: Mar 30, 2020
SET

SET (Secure Electronic Transaction) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by MasterCard, Visa, Microsoft, Netscape,...Read More

1 Answer

212 views
Wyatt Williams
Answered: Mar 30, 2020
224.181.x.x

Private address ranges are designed for use on private networks. The ranges are 10.x.x.x, 172.16.x.x to 172.32.x.x, and 192.168.x.x. Therefore, answers A, B, and C are all valid...Read More

1 Answer

211 views
Sebastiano
Answered: Mar 30, 2020
VLANs

When you place systems in a VLAN, by default they cannot communicate with systems outside the VLAN. You can have a router route the information from one VLAN to another.

1 Answer

210 views
Shellbreiner
Answered: Mar 30, 2020
Bootrec /fixboot

1 Answer

210 views
Wyatt Williams
Answered: Mar 30, 2020
VLAN

A VLAN is implemented on a switch to create multiple separate networks. A proxy server (answer A) is used to control access to the Internet. Subnet masking (answer B) is not a valid...Read More

1 Answer

210 views
Shellbreiner
Answered: Mar 30, 2020
Bad driver

1 Answer

210 views
Wyatt Williams
Answered: Mar 30, 2020
Ipconfig

The ipconfig utility can be used to view the TCP/IP configuration on a Windows 2000, Windows XP, Windows Vista, or Windows Server 2003 system. None of these operating systems...Read More

1 Answer

208 views
Sebastiano
Answered: Mar 30, 2020
Password complexity

Implementing password complexity is a way to countermeasure dictionary attacks on the network. Implementing an account lockout policy is a potential way to protect...Read More

1 Answer

208 views
Sebastiano
Answered: Mar 30, 2020
SYN, ACK/SYN, ACK

The order of the packets for a three-way handshake is SYN, ACK/SYN, and then ACK.

1 Answer

208 views
Wyatt Williams
Answered: Mar 30, 2020
Port-based access control

802.1x is an IEEE standard specifying port-based network access control. Port-based network access control uses the physical characteristics of a switched local...Read More

1 Answer

208 views
Shellbreiner
Answered: Mar 30, 2020
Ultimate

1 Answer

208 views
Sebastiano
Answered: Mar 30, 2020
DDoS

A smurf attack is an example of a DDoS attack. It involves the hacker spoofing the IP address so that ping messages appear to come from the victim. When all of the systems that were...Read More

1 Answer

207 views
Sebastiano
Answered: Mar 30, 2020
Standard

A standard is the type of policy that must be followed. The other answers are incorrect for the following reasons: A procedure is a step-by-step document that demonstrates how to...Read More

1 Answer

207 views
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.