Questions LLC
Login
or
Sign Up
Ask a New Question
Network Security
Page 2
Questions (114)
What data protection technique can prevent most criminals from hacking into networks?
(1 point) A. Padlocks B. Firewalls C.
1 answer
asked anonymously
19 views
Computer networks depend on small packets of data known as _____ to encrypt and protect data.
A. Private keys B. Public keys C.
1 answer
asked anonymously
46 views
What is DNS Spoofing?(2 points) Responses When a "Hacker" gains access to a DNS Server and re-routes or changes the IP address
1 answer
asked anonymously
25 views
A student is reading a book about hackers. Which computing specialization relates to this topic the most?
(1 point) systems
1 answer
asked by
Blue
13 views
Which of the following is NOT a feature of a firewall?
A. closing network ports B. filtering incoming packets of data C. blocking
1 answer
asked anonymously
32 views
Which of the following is NOT a feature of a firewall?(2 points)
Responses A closing network ports B filtering incoming packets
3 answers
asked by
ANSWER CORRECTLY
126 views
Which of the following is NOT a feature of a firewall? (2 points)
Closing network ports filtering incoming packets of data
1 answer
asked anonymously
38 views
which of the following is NOT a feature of a firewall.
A. closing network ports B. filtering incoming packets of data C. blocking
1 answer
asked anonymously
23 views
Which of the following is NOT a feature of a firewall?(2 points)
Responses closing network ports closing network ports filtering
1 answer
asked anonymously
58 views
Which of the following is NOT a feature of a firewall?(2 points) Responses closing network ports closing network ports filtering
1 answer
asked anonymously
36 views
What is a critical device for filtering malicious network packets from the internet?(1 point)
Responses port port router router
1 answer
asked anonymously
43 views
Which of the following is NOT a feature of a firewall?(2 points) Responses closing network ports closing network ports filtering
1 answer
asked anonymously
39 views
Which of the following is NOT a feature of a firewall?(2 points) Responses closing network ports closing network ports filtering
1 answer
asked by
dee
39 views
Which of the following is NOT a feature of a firewall?(2 points)
Responses A. closing network ports B. filtering incoming packets
1 answer
asked anonymously
45 views
Which of the following is NOT a feature of a firewall? (1 points)
A. closing network ports B. filtering incoming packels of data
1 answer
asked by
Connexus_solver
30 views
omputer networks depend on small packets of data known as _____ to encrypt and protect data.
(1 point) Responses private keys
1 answer
asked by
tonton
62 views
Computer networks depend on small packets of data known as _____ to encrypt and protect data.
(1 point) Responses private keys
1 answer
asked by
tonton
62 views
What data protection technique can prevent most criminals from hacking into networks?
(1 point) Responses padlocks padlocks
1 answer
asked by
tonton
36 views
Which of the following is NOT a feature of a firewall? (2 points)
• closing network ports • filtering incoming packets of
1 answer
asked anonymously
25 views
What is a critical device for filtering malicious network packets from the internet?(1 point)
Responses port port firewall
1 answer
asked by
Triston Davis
54 views
What security feature should you always turn on when your laptop is connected to public Wi-Fi to ensure a layer of security that
1 answer
asked anonymously
32 views
Which of the following is NOT a feature of a firewall?(2 points)
Responses which one is correct closing network ports closing
1 answer
asked anonymously
47 views
What is the purpose of a firewall?(1 point)
Responses shape internet traffic shape internet traffic count how many users are on
1 answer
asked anonymously
26 views
A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus
1 answer
asked anonymously
29 views
A router that connects your local area network (LAN) to the internet has a basic built-in firewall that does not have any
1 answer
asked anonymously
31 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
asked anonymously
26 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
asked anonymously
28 views
You need to develop a plan to stop attacks on your router from the outside. In 3–5 sentences, explain what would be the best
1 answer
asked anonymously
44 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
asked anonymously
21 views
A router that connects your local area network (LAN) to the internet has a basic built-in firewall that does not have any
1 answer
asked anonymously
43 views
You need to develop a plan to stop attacks on your router from the outside. In 3–5 sentences, explain what would be the best
1 answer
asked anonymously
25 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
asked anonymously
88 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
asked anonymously
26 views
What is the general network process that describes a new user gaining access to the network with a username and password?
A.
1 answer
asked by
young_240sx
25 views
In the context of Web and network privacy issues, new employees in an organization have to sign a(n) _____before they access the
1 answer
asked by
KO
28 views
which are different factors that affect the security of a network?(5pts)
1 answer
asked by
Mulunesh M
10 views
Neil depends on computer networks in order to securely invest his clients’ money. In what type of environment is Neil using
1 answer
asked anonymously
23 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
asked by
hatemaths
20 views
A router that connects your local area network (LAN) to the internet has a basic built-in firewall that does not have any
1 answer
asked by
hatemaths
24 views
What is a critical device for filtering malicious network packets from the internet?(1 point)
Responses port port firewall
1 answer
asked by
Donald Craven
31 views
Virtual private networks (VPNs) employ which protection mechanism?(1 point)
Responses hash algorithms hash algorithms multifactor
1 answer
asked by
Donald Craven
39 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
asked by
Donald Craven
21 views
VPNs employ which protection mechanism?
A. encryption B. MFA C. checksums D. hash algorithms
1 answer
asked by
young_240sx
12 views
An organization's extranet server is typically placed in a network area called the ______ that is separate from the LAN.
Question
1 answer
asked by
KO
14 views
In a typical intranet configuration, the ___________ must define each user’s level of access.
Question 14 options: DBMS Human
1 answer
asked by
KO
14 views
Danielle needs to provide file protection for a network. What does she use to encrypt certain files, restrict access to
1 answer
asked anonymously
24 views
Which security method prevents any incoming digital traffic that is perceived as a threat from entering the computer? (1 point)
1 answer
asked anonymously
21 views
Pat is a network administrator at a large company. A new virus got through the network antivirus software. What should Pat do
1 answer
asked anonymously
23 views
Eric works for a large company that has many employees. He needs to provide protection for the entire network that will prevent
1 answer
asked anonymously
24 views
what is IKS
1 answer
asked anonymously
15 views
Pages
1
2
3
Parent Categories (19)
College courses
Computer Networks
Computer Science
Computer Science and Technology
Computer Science or Technology
Computer Science/Technology
Cybersecurity
Information Technology
Internet Safety
Investment Management
Network Connection
Network Segmentation Design Technologies
Network systems
Networking
Security
Technology
Technology / Networking
Technology and Computer Science
Technology and Security