Tuesday, February 9, 2016

CIS 312 FINAL EXAM


BUY HERE


CIS 312 Final Exam
1.     A ______ is a device that provides a connection between two LANs, or it can separate them into two sections.
2.     The ______ command is a network tool used to test TCP/IP and Internet connections for proper connection.
3.     A ______ is a computer on the network that provides other computers within the network with access to resources, such as disk drives, folders, printers, modems, scanners, and Internet access.
4.     What cable type is known for transmitting signal through light rather than electrical signals?
5.     What protocol is used by both web browsers or specialized programs to exchange and manipulate files over an Internet protocol computer network?
6.     Which of the following Internet access methods represents broadband Internet service?
7.     A ______ is a network node that provides a connection between a LAN and a WAN or the Internet.
8.     An IPV4 address consists of ______ numbers that range from 0 to 255.
9.     What network protocol enables data to be exchanged between two computers over a secure channel?
10.   What is the maximum distance 1000BASET can travel per segment?
11.   Windows XP can be installed on either _____ or ______ file systems.
12.   Social engineering is composed of a variety of methods to manipulate users into performing actions or providing information. Which of the following are among the many methods used during social engineering?
13.   Login Authentication involves verifying which of the following? (Choose all that apply.)
14.   All the following are standards for wireless encryption except ________?
15.   Two-way firewalls provide protection against unauthorized ______ and ______ traffic.
16.   Which of the following features can be used as a simple firewall within wireless routers and WAPs?
17.   What types of Local Security Policies can be applied to protect data residing on a system?
18.   A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network.
19.   To prevent an attacker from detecting your wireless network signals, what should be changed from the manufacturer defaults?
20.   Which of the following wireless encryption standards uses AES encryption?











                     

No comments:

Post a Comment