Created by Odin D.
over 6 years ago
|
||
What high-speed storage network protocols used by a SAN is IP-based?
Which Fibre Channel zone is the most restrictive?
An attacker can use NetBIOS to determine each of the following EXCEPT __________.
Which type of log can provide details regarding requests for specific files on a system?
Which type of device log contains the most beneficial security data?
Which type of cloud is offered to all users?
Which of these would NOT be a valid Internet Control Message Protocol (ICMP) error message?
Internet Control Message Protocol (ICMP) is used by each of these attacks EXCEPT _________.
Which version of Simple Network Management Protocol (SNMP) is considered the most secure?
Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?
SFTP
Each of these is a technique for securing a router EXCEPT _________.
Which statement about a flood guard is true?
Each of these is an entry in a firewall log that should be investigated EXCEPT ___________.
If a group of users must be separated from other users, which is the most secure network design?
Why is loop protection necessary?
What does MAC limiting and filtering do?
In a network using IEEE 802.1x a supplicant __________.
Which statement is true regarding security for a computer that boots to Apple Mac OS X and then runs a Windows virtual machine?
Which of the following is NOT a security concern of virtualized environments?