The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 57 Weeks Ago |
| Questions Answered: | 7570 |
| Tutorials Posted: | 7352 |
BS,MBA, PHD
Adelphi University/Devry
Apr-2000 - Mar-2005
HOD ,Professor
Adelphi University
Sep-2007 - Apr-2017
|
Week 5 Quiz |
| Â |
Â
·        Â
|
· Question 1 2 out of 2 points
· Question 2 2 out of 2 points
· Question 3 2 out of 2 points
· Question 4 2 out of 2 points
· Question 5 2 out of 2 points
· Question 6 2 out of 2 points
· Question 7 2 out of 2 points
· Question 8 2 out of 2 points
· Question 9 2 out of 2 points
· Question 10 2 out of 2 points
· Question 11 2 out of 2 points
· Question 12 2 out of 2 points
· Question 13 2 out of 2 points
· Question 14 2 out of 2 points
· Question 15 2 out of 2 points
· Question 16 2 out of 2 points
· Question 17 2 out of 2 points
· Question 18 2 out of 2 points
· Question 19 2 out of 2 points
· Question 20 2 out of 2 points
· Question 21 2 out of 2 points
· Question 22 2 out of 2 points
· Question 23 2 out of 2 points
· Question 24 2 out of 2 points
· Question 25 2 out of 2 points
· Question 26 2 out of 2 points
· Question 27 2 out of 2 points
· Question 28 2 out of 2 points
· Question 29 2 out of 2 points
· Question 30 2 out of 2 points
· Question 31 2 out of 2 points
· Question 32 2 out of 2 points
· Question 33 2 out of 2 points
· Question 34 2 out of 2 points
· Question 35 2 out of 2 points
· Question 36 2 out of 2 points
· Question 37 2 out of 2 points
· Question 38 2 out of 2 points
· Question 39 2 out of 2 points
· Question 40 2 out of 2 points
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Â
Â
|
Week 8 Quiz |
| Â |
·        Â
·        Question 1
2 out of 2 points
| Â | Â | |||
| Â |
Which technology provides networking capabilities over existing CAT3 cable and can share the same wire as a standard telephone line? |
 |  |  |
|
 |  |  | |
·        Question 2
2 out of 2 points
| Â | Â | |||
| Â |
Which Wi-Fi standard uses dual-band technology and support simultaneous connections on both the 2.4 GHz and 5 GHz bands? |
 |  |  |
|
 |  |  | |
·        Question 3
2 out of 2 points
| Â | Â | |||
| Â |
In which type of network can every computer communicate directly with the other computers on the same network without going through an access point? |
 |  |  |
|
 |  |  | |
·        Question 4
2 out of 2 points
| Â | Â | |||
| Â |
Which IEEE standard includes 802.1x RSN, and CCMP security features? |
 |  |  |
|
 |  |  | |
·        Question 5
2 out of 2 points
| Â | Â | |||
| Â |
Which of the following is a names a particular WLAN and must be used by all devices in the same WLAN? |
 |  |  |
|
 |  |  | |
·        Question 6
2 out of 2 points
| Â | Â | |||
| Â |
In which technique does an attacker acquire a trusted address that allows the attacker to communicate with the access point? |
 |  |  |
|
 |  |  | |
·        Question 7
2 out of 2 points
| Â | Â | |||
| Â |
Which intrusion detection technique is based on heuristics or behavioral rules derived from a baseline established during normal network operations? |
 |  |  |
|
 |  |  | |
·        Question 8
0 out of 2 points
| Â | Â | |||
| Â |
Which of the following symptoms is an indication of possible network intrusions? |
 |  |  |
|
 |  |  | |
·        Question 9
2 out of 2 points
| Â | Â | |||
| Â |
Which intrusion detection technique is also known as misuse detection and is based on creating models of intrusions? |
 |  |  |
|
 |  |  | |
·        Question 10
2 out of 2 points
| Â | Â | |||
| Â |
What type of attack at the IP layer allows an attacker to attempt arbitrary attacks against hosts on a network, without the IDS ever realizing it? |
 |  |  |
|
 |  |  | |
·        Question 11
2 out of 2 points
| Â | Â | |||
| Â |
Which of the following monitors key system objects to determine whether an intruder has changed them? |
 |  |  |
|
 |  |  | |
·        Question 12
2 out of 2 points
| Â | Â | |||
| Â |
Which type of intrusion detection system is platform-centric and is effective at detecting unauthorized file modification? |
 |  |  |
|
 |  |  | |
·        Question 13
2 out of 2 points
| Â | Â | |||
| Â |
Which device is a computer or virtual appliance purposely set up as a vulnerable system? |
 |  |  |
|
 |  |  | |
·        Question 14
2 out of 2 points
| Â | Â | |||
| Â |
Which technology uses an individual's unique physical traits to identify a valid user? |
 |  |  |
|
 |  |  | |
·        Question 15
2 out of 2 points
| Â | Â | |||
| Â |
Which security item is a physical object? |
 |  |  |
|
 |  |  | |
·        Question 16
2 out of 2 points
| Â | Â | |||
| Â |
What procedure is used to translate information into code for secure transmission? |
 |  |  |
|
 |  |  | |
·        Question 17
2 out of 2 points
| Â | Â | |||
| Â |
What type of network functions securely by "tunneling" through larger public networks? |
 |  |  |
|
 |  |  | |
·        Question 18
2 out of 2 points
| Â | Â | |||
| Â |
This officer primarily looks into network security and related issues. |
 |  |  |
|
 |  |  | |
·        Question 19
2 out of 2 points
| Â | Â | |||
| Â |
What is used to verify a user's identity and security clearance? |
 |  |  |
|
 |  |  | |
·        Question 20
2 out of 2 points
| Â | Â | |||
| Â |
Which technology deals with information that is unintentionally leaked out of computers through energy emissions? |
 |  |  |
|
 |  |  | |
Â
|
Week 10 Quiz |
| Â |
Â
Â
·        Â
·        Question 1
4 out of 4 points
| Â | Â | |||
| Â |
With what type of attack does the attacker simply inject a single or a few bad packets into a router to exploit a network? |
 |  |  |
|
 |  |  | |
·        Question 2
4 out of 4 points
| Â | Â | |||
| Â |
What can you use to monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it? |
 |  |  |
|
 |  |  | |
·        Question 3
4 out of 4 points
| Â | Â | |||
| Â |
What type of attack causes routers to mishandle packets, resulting in traffic congestion? |
 |  |  |
|
 |  |  | |
·        Question 4
4 out of 4 points
| Â | Â | |||
| Â |
What can you run from a command shell to identify a router? |
 |  |  |
|
 |  |  | |
·        Question 5
4 out of 4 points
| Â | Â | |||
| Â |
What can you do to access a router to see if its firewall is configured? |
 |  |  |
|
 |  |  | |
·        Question 6
4 out of 4 points
| Â | Â | |||
| Â |
Which device receives digital signals and converts them into analog signals, and vice versa? |
 |  |  |
|
 |  |  | |
·        Question 7
4 out of 4 points
| Â | Â | |||
| Â |
Which tool is a parallelized login cracker that supports numerous protocols for attack? |
 |  |  |
|
 |  |  | |
·        Question 8
4 out of 4 points
| Â | Â | |||
| Â |
Which term can be described as the unauthorized alteration of routing tables? |
 |  |  |
|
 |  |  | |
·        Question 9
4 out of 4 points
| Â | Â | |||
| Â |
Which tool can perform multiple-thread scanning, application-layer fingerprinting, and host discovery for telnet, SSH, Web, NTP, and SNMP? |
 |  |  |
|
 |  |  | |
·        Question 10
4 out of 4 points
| Â | Â | |||
| Â |
Which device maintains a table of the available networks to determine the best path to get a packet to its destination? |
 |  |  |
|
 |  |  | |
Â
SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC-----------