TipsMake
Newest

Multiple choice questions about network safety deployment have the answer P1

  1. Question 1: Prevention of attacks Denial of service attacks (DDOS)
    1. Only a firewall can be used
    2. Can be limited by programming
    3. Currently there is a way to effectively prevent
    4. The only effective way is to store and restore (backup and restore)
  2. Question 2: Buffer once
    1. Lock is only used once
    2. May not be safe due to distribution
    3. Generate random lock
    4. All right
  3. Question 3: In DAC, which model uses static and dynamic graph structure
    1. Multi-level database access model
    2. Take-grant model
    3. Access matrix model
    4. Acten Model (Action. Entity)
  4. Question 4: RSA is an algorithm
    1. Public code
    2. Is the name of an international organization for encryption
    3. Private key code
    4. All is wrong
  5. Question 5: One of two approaches to symmetric code attack
    1. Attack find key
    2. Full browser attack
    3. Attack find the clear version
    4. All is wrong
  6. Question 6: Which of the following security structures is used with WAP wireless standard?
    1. WTLS
    2. SSL
    3. HTTPS
    4. WEP encryption
  7. Question 7: The most effective and safe access control method for wireless networks is
    1. WEP encryption 40 bits
    2. VPN
    3. Identify network security
    4. WEP 128 bit encryption
  8. Question 8: MAC address filter is defined as
    1. Personal firewall
    2. Prevent access from a certain MAC address
    3. Permitted access to a certain MAC address
    4. All right
  9. Question 9: Which of the following wireless security structures is the least secure?
    1. VPN
    2. WEP encryption 40 bits
    3. Secure network identity
    4. WEP 128 bit encryption
  10. Question 10: Which WEP encryption level should be set on an 802.11b network?
    1. 128 bit
    2. 40 bits
    3. 28 bit
    4. 16 bit
Jessica Tanner
Share by Jessica Tanner
Update 24 May 2019