This mock exam set focuses on VPN and dial-up connection security, covering protocols, authentication servers, and secure configurations.
True
False
Rate this question:
Yes
No
Rate this question:
21
20
25
119
Rate this question:
It steps us AC voltage
It steps down DC voltage
It modulates and demodulates signals for the Computer and the telephone line.
It converts Analog signals to digital and vice versa.
Rate this question:
PPTP
IPSec
Kerberos
Certificate
Rate this question:
True
False
Rate this question:
PPTP
L2TP
HTTP
NNTP
Rate this question:
Run regular vulnerability checks
Update Virus definitions
Re-install OS at regular frequency
Disk management should be regular
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Block port numbers 20 and 21 on the external interface for incoming connections
Block port numbers 20 and 21 on the internal interface.
Block port numbers 67 and 68 on the external interface for incoming connections
Block port numbers 67 and 68 on the internal interface
Rate this question:
Proxy
Router
PC
Switch
Rate this question:
Authenticating server
RADIUS Server
HTTP Server
File Server
Rate this question:
SLIP
PPTP
POP3
PPP
Rate this question:
Perform OS hardening by blocking all access to this server
Perform OS hardening by verify and terminating all un used service
Regularly check for unused usernames and disable or delete them.
Ensure you are running a vulnerability check on this server at regular intervals.
Rate this question:
Physical layer
Datalink layer
Network Layer
None of the above
Rate this question:
Protocol information
Source address
Destination address
No of bytes in the header
Rate this question:
Network policy
Firewall policy
Access policy
None of the above
Rate this question:
Rename guest accounts
Rename administrator accounts.
Ensure there is just one administrator account present.
Ensure the administrator account does not have a blank password
None of the above
Rate this question:
It requires line of sight
It requires the same radio frequency at the transmitting and receiving end.
It is least secure.
Interception is possible if the tapping devices is also in the line of sight
Interception is possible if the tapping device is also tuned to the same radio frequency as the main communicating devices.
Rate this question:
Worms
Trojan horse
Boot Record virus
EXE file virus
Rate this question:
Wireless 802.11b and g
Microwave
Blue tooth
Radio frequency
Rate this question:
It maintains a state table
It maintains a routing table
It functions on the network layer
It functions on the application layer.
Rate this question:
Scan before downloading
Scan before sending
Scan before opening
Scan after receiving
Rate this question:
Stateful Inspection
Port filtering
Packet filtering
Application filtering
Rate this question:
Verifies if destination domain is self or not before transmitting a mail
Verifies if recipient is from local domain or not before receiving an email
Verifies if email is infected or not
None of the above
Rate this question:
TACACS
RADIUS
IAS
None of the above
Rate this question:
Do not host a database server on the same server as your web server.
Do not host a database server on a server based system
Employ a three-tier model
Employ a centralized administration model.
Rate this question:
Quiz Review Timeline (Updated): Mar 17, 2022 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.