Which IEEE standard defines the communication protocol for Wireless?
Which Command Line Utility is shown?
In a ______ attack the attacker places himself between the two hosts...
Involves creating matching private and public keys by using the...
This is the science of encrypting and decrypting data. It is a...
MAC & LLC (logical Linc Control) are sublayers of which OSI Layer?
Which Command Line Utility is shown?
Which protocol is used to convert logical IP addresses to physical MAC...
Which IEEE standard defines the communication protocol for Eithernet?
Contains IP Addressing and subnet information along with other...
Which Command Line Utility is shown?
Which NIDS reaction option (Network Intrusion Detection System) sent...
Of the four components to security on a wireless network, to which one...
To which TCP/IP architecture layer do email and web browser protocols...
Contains the locations of client computers, servers, network printers,...
______ is when an attacker puts a Web server between the victim's Web...
Which NIDS reaction option (Network Intrusion Detection System)...
This NIDS reaction option (Network Intrusion Detection System)...
This NIDS reaction option (Network Intrusion Detection System) is...
The IPsec protocol suite is made up of 4 separate protocols, which is...
Rather than destroying or stealing data a ______ attack is designed to...
Which IEEE standard defines the communication protocol for Blue Tooth?
When the attacker between two hosts takes over the role of one of the...
Which of the 3 main VPN security models does not typically use...
In this type of intrusion prevention, IDS monitors your system based...
This authentication method encapsulates PPP inside Eithernet frames...
Which Command Line Utility is shown?
The Ping utility is the most common use of which protocol?
The target systems in a ______ attack use Zombies, Bots or Agents...
This starts when a user approaches the Certificate Authority...
What port is used by NNTP (Network NewsTransfer Protocol)?
This authentication defines message formats rather than being an...
The IPsec protocol suite is made up of 4 separate protocols, which is...
______ contains performance statistics for computers and other devices...
To which TCP/IP architecture layer do TCP and UDP belong?
Which command line utility is shown?
When an attacker instructs a router to forward packets with a...
Which TCP / IP architecture layer makes use of ports?
It involves securely making the certificate information available to a...
Which of the 3 main VPN security models are the typical sort of...
What port is used by SSH (Secure Shell)?
Which IEEE standard defines the communication protocol for Token Ring?
Of the NIDS (Network intrusion detection system) reaction options...
The NIDS reaction option (Network Intrusion Detection System)...
124.6.102.87 is a Class _____ IP Address.
After installing the DHCP server on a domain member server, what must...
This component is the server or client that Kerbos can assign tickets...
__________ are designed to fix security vulnerabilities.
224.106.27.170 is a Class _____ IP Address.
Is done through the use of algorithm which is a mathmatical or...
The IPsec protocol suite is made up of 4 separate protocols, which is...
What port is used by BootP & DHCP (Boot Protocl/Bootstrap...
A standarsized tunneling protocol that generally combines the best...
Which protocol is responsible for the logical addressing of each...
What port is used by SNMP (Simple Network Management Protocol)?
When traffic is redirected by an attacker by modifiying the victims...
Which is NOT a valid subnet mask?
This Kerbos component service provides an authorized service or...
A standardized network protocol that encrypts data at the Network (OSI...
Which type of attack sent an oversized fragmented packet that when...
To which TCP/IP architecture layer do the media access methods...
This authentication method validates the remote client's identity Is...
What port is used by TFTP (Trivial File Transfer Protocol)?
What was introduced to make IPv4 Internet routing more efficient.
This Kerbos item is used in communication between client and resource...
What type of attack sends a lot of 1/2 open TCP connections which...
The users in a subset of Kerbos are refered to as a __________.
This uses two keys to avoid the troubles associated with sharing the...
_________ is when an attacker passivly records data passing between...
To which TCP/IP architecture layer do routing protocols belong?
Of the NIDS (Network intrusion detection system) reaction options...
In this type of intrusion prevention, IDS compares the current state...
This is a VPN protocol were once a link has been established, the...
Which is the correct order for the 3 AAA Phases?
Data information is sent onto the network cable using which of the...
243.16.2.117 is a Class _____ IP Address.
Which of the 3 main VPN security models are 3rd party private networks...
The IPsec protocol suite is made up of 4 separate protocols, which is...
What port is used by NTP (Network Time Protocol)?
This authentication method requires both the client and the server to...
Which IEEE standard defines the communication protocol for Air Cards?
Which of the following protocols are considered unsecure? (Choose all...
This binds an entity's unique distinguished name (DN) and other...
When public and private keys are related matmatically, the RSA cypher...
This is a server component of Kerbos that runs AG and TGS services to...
This Kerbos item is a record that usually lasts for 5 minutes...
This Kerbos item is a record used by a client to authenticate to a...
An IPv6 subnet ID is how many bits long?
This item is granted during the Kerbos authentication process. It is...
Which type of attack overwhelms a host by flooding it with ICMP...
A realm is also known as a __________?
Which is the correct hexidecimal subnet chain?
During a certificates 10 stage life cycle which of these are the first...
This Kerbos item is a ticket for the resource server along with the...
Using certain programs this type of attack allows the attacker to...
A 3rd party authorized to generate keys and send them would define...
Which of the following are client options that can be set at the scope...
This Kerbos component is a service that gives ticket-granting tickets...
During a certificates 10 stage life cycle which of these are...