Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Net 455A computer uses a dictionary of vulnerabilities in published operations and application software

Rating
-
Sold
-
Pages
53
Grade
A+
Uploaded on
30-07-2022
Written in
2021/2022

Net 455A computer uses a dictionary of vulnerabilities in published operations and application software

Institution
Course

Content preview

Net 455>A computer uses a dictionary of vulnerabilities in
published operations and application software



A computer uses a dictionary of vulnerabilities in published operations and application software
(cve.mitre.org). What is the name of this dictionary?
-CVE

A user filed a complaint with their company's helpdesk support team about threatening pop-up
messages. The messages say the user's files are encrypted due to terroristic activity and that the data
will stay encrypted until paid in bitcoin. What type of attack is the user most likely witnessing?
-Ransomware

Which type of encryption cipher is used in Wi-Fi Protected Access 2 (WPA2)? (Select all that apply.)
-Advanced Encryption Stand (AES)
-Chaining Message Authentication Code Protocol (CCMP)

A vendor visits an organization to demo a network management device. As part of the hands-on
demonstration, an IT engineer can see and manage an extended service set (ESS) on the network. Based
on the engineer's experience with the device, what is the vendor demonstrating?
-Wireless controller

A network administrator would like to setup a group of servers to retrieve the same content from a
single host on the internal network. Which of the following will allow this type of data flow? (Select all
that apply.)
-IGMP must be used to configure group membership.
-A multicast IP address is assigned to the servers.

Starting with Pin 1, what order of colored wires of a standard CAT6 network cable would make it comply
with the T568B standard?
-Orange/White, Orange, Green/White, Blue, BlueWhite, Green, Brown/White, Brown

A host uses Internet Protocol version 6 (IPv6). The host sends a
packet over the Internet using router advertisement. The IPv6
packets insert into Internet Protocol version 4 (IPv4) packets. The
packets route over the IPv4 network to their destination. What is
providing this function?
-Tunneling

A security analyst is looking at various network traffic but can't
make heads or tails of most of the packets. Which of the following
traffic would they be able to read without private keys?
-Port 110

What tool can be used to test ethernet cabling?

,-Wire map

A network consultant is installing Ethernet to a hub in the control
room. When Ethernet is wired with a hub, there needs to be a means

,of distinguishing the interface on an end system with the interface
on an intermediate system. What is the name of the end system
interface?
-MDI-X

What step of the CompTIA Network+ troubleshooting methodology
involves confirming a theory and determining the next steps to
resolve a problem?
-3

An IT engineer uses the Nmap utility to document a network. The
documentation will then help the engineer plan network
improvements. Which of the following describes the use of Nmap for
this purpose?
-Systems hardening

A cyber consultant examines the security of the control room and
evaluates the organization's maturing level and its use of
security policy and controls. What is the name of this
assessment?
-Posture assessment

A network administrator is researching network virtualization and is
trying to find a standard architecture for appliances to be developed
against. Which of these should the administrator look at for a
standard?
-NFV

A network professional is installing software onto every company
computer and phone that requires several layers of protection for
authentication. What is this called?
-Multifactor

A network consultant is conducting a test to determine the amount
of data transferred through a connection over a given period. What
is the consultant testing?
-Bandwidth

The physical security department of a bank wants to require
employees to authenticate through a locked barrier before accessing
the sensitive areas of the building, such as the IT department. If

, implemented, which of the following will best help regulate such
physical access? (Select all that apply.)
-Biometric Device
-Smart Badge

After a site survey, the network technician found the single wireless
2.4 gigahertz (Ghz) access point (AP) in a large office floor space
does not have a strong enough signal, and is contending a
significant amount of background noise and interference. What will
these findings most likely limit on the AP's wireless signal?
-They will limit the signal's range.

A multi-tenant third-party cloud service that is available via the
Internet can be described as which of the following cloud delivery
models?
-Public

A communications company uses TIA/EIA IS-95 handsets that require
each subscriber to use a code to key the modulation of their signal.
The receiver uses this "key" to extract the subscriber's traffic from
the radio signal. What type of handsets is the company using?
-CDMA

A network port does not seem to be working properly. Which of the
following tools can be used to test if the the port is sending out
data?
-Loopback plug

A computer technician is reading archived logs and identifies that
the company was using 802.11n. Not knowing what this Wi-Fi
category meant, the technician researched its origins. In recent
years, what was 802.11n renamed?
-Wi-Fi 4



Engineers survey a newly acquired set of buildings as part of an
organizational acquisition. The facilities are a few hundred yards
from one another. On-site IT staff state a fiber connection between
the buildings, but it has been very unreliable and often does not

Written for

Course

Document information

Uploaded on
July 30, 2022
Number of pages
53
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$28.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Autonomousgrades Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
51
Member since
4 year
Number of followers
45
Documents
5519
Last sold
7 months ago
realer

Hello , I am very friendly and experienced tutor dedicated to my teaching work. If you need any kind of help then you can contact me with any questions about your course .I can help you with everything - tests, quizzes, exams, db threads and so on. Just ask me if you want to get an A on your courses.

4.4

10 reviews

5
6
4
2
3
2
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions