What is the first step they should do to create the network vulnerability assessment plan?

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how...

May 1, 2021 No Comments READ MORE +

If a network is at risk from unskilled individuals, what type of threat is this?

If a network is at risk from unskilled individuals, what type of threat is this?A . External ThreatsB . Structured ThreatsC . Unstructured ThreatsD . Internal ThreatsView AnswerAnswer: C

May 1, 2021 No Comments READ MORE +

What command will he use to check the ports applications open?

Alex is administrating the firewall in the organization's network. What command will he use to check the ports applications open?A . Netstat -anB . Netstat -oC . Netstat -aD . Netstat -aoView AnswerAnswer: A

April 30, 2021 No Comments READ MORE +

At what layer of the OSI model does an IPsec tunnel function on?

Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?A . They work on the session layer.B . They function...

April 29, 2021 No Comments READ MORE +

What are they?

Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk factor. What are they? (Select all that apply) Risk factor =.............X...............X...........A . VulnerabilityB . ImpactC . AttackD . ThreatView...

April 29, 2021 No Comments READ MORE +

What are the other f unction(s) of the device?

A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other f unction(s) of the device? (Select all that apply)A . Provides access memory, achieving high efficiencyB . Assigns user addressesC . Enables input/output (I/O) operationsD . Manages security keysView AnswerAnswer: B,C,D

April 29, 2021 No Comments READ MORE +

Which type of filter will be used to detect this on the network?

Mark is monitoring the network traffic on his organization's network. He wants to detect a TCP and UDP ping sweep on his network. Which type of filter will be used to detect this on the network?A . Tcp.srcport==7 and udp.srcport==7B . Tcp.srcport==7 and udp.dstport==7C . Tcp.dstport==7 and udp.srcport==7D . Tcp.dstport==7...

April 29, 2021 No Comments READ MORE +

What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?

The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you...

April 28, 2021 No Comments READ MORE +

What layer of the OSI model do IPsec tunnels function on?

Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?A . The data link layerB . The session layerC . The network layerD . The...

April 28, 2021 No Comments READ MORE +

------------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

------------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)A . 802.15B . 802.16C . 802.15.4D . 802.12View AnswerAnswer: B

April 28, 2021 No Comments READ MORE +