Q: A measure can be what type of data? Select all that apply. or Q: What kind of data may be used as a measure? Choose every option that pertains. • Qualitative • Continuous • Discrete • Quantitative Explanation: Measures are always quantitative, and they can be either continuous or discrete. Qualitative data is not a type of measure.
-
-
What traffic does an implicit deny firewall rule block?
Q: What traffic does an implicit deny firewall rule block? or Q: What kind of traffic is blocked by an implicit deny firewall rule? Outbound traffic only All traffic that is not explicitly permitted or allowed Inbound traffic only Only traffic that is explicitly blocked Explanation: This means that any traffic not specifically allowed by other rules is automatically denied…
-
What kind of attack does IP Source Guard (IPSG) protect against?
Q: What kind of attack does IP Source Guard (IPSG) protect against? or Q: Which sort of assault is protected against by IP Source Guard (IPSG)? Rogue DHCP Server attacks IP Spoofing attacks DoS attacks ARP Man-in-the-middle attacks Explanation: IPSG helps prevent devices from using IP addresses that are not assigned to them, thereby protecting against IP spoofing, where an…
-
A host-based firewall protects against malicious attacks in which of the following scenarios? Select all that apply.
Q: A host-based firewall protects against malicious attacks in which of the following scenarios? Select all that apply. or Q: Which of the following situations is protected against harmful assaults by a host-based firewall? Choose every option that pertains. A company’s network experiences a layer 2 man-in-the-middle attack. A device on a company’s internal network needs protection when another device…
-
What underlying symmetric encryption cipher does WEP use?
Q: What underlying symmetric encryption cipher does WEP use? or Q: Which symmetric encryption cipher is used by WEP? AES RC4 DES RSA Explanation: WEP (Wired Equivalent Privacy) uses the RC4 symmetric encryption cipher.
-
Which of the following are critical flaws of PIN entry WPS authentication with a hard-coded PIN?
Q: Which of the following are critical flaws of PIN entry WPS authentication with a hard-coded PIN? or Q: What are the main drawbacks of using a hard-coded PIN for PIN entering WPS authentication? There is a one-minute lockout period after three incorrect PIN attempts. It uses an 8-digit pin, which is made of 7 digits and one checksum value,…
-
How can you increase the security of a wireless network that uses WPA2 with AES/CCMP mode?
Q: How can you increase the security of a wireless network that uses WPA2 with AES/CCMP mode? or Q: In what ways might the AES/CCMP mode of WPA2 be used to strengthen the security of a wireless network? Change the SSID to something rare and unique. Connect clients with WPS Use a long, complex passphrase that wouldn’t be found in…
-
What feature of enterprise-managed switches allows you to take all packets from a specified port, port range, or entire VLAN and mirror the packets to a specified switch port?
Q: What feature of enterprise-managed switches allows you to take all packets from a specified port, port range, or entire VLAN and mirror the packets to a specified switch port? or Q: What feature of switches that are administered by enterprises enables you to mirror all packets from a certain port, port range, or whole VLAN to a different switch…
-
You’re an IT support specialist tasked with setting up a NIDS system to monitor your company’s network traffic for suspicious behavior. Which constraint must you consider when you set up the NIDS?
Q: You’re an IT support specialist tasked with setting up a NIDS system to monitor your company’s network traffic for suspicious behavior. Which constraint must you consider when you set up the NIDS? or Q: As an IT support professional, it is your responsibility to configure an NIDS system to watch over network traffic in your firm and look for…
-
Complete the Qwiklab Introduction to tcpdump before answering this question. You want to use tcpdump to retrieve packets with 113.8.81.2 as the source or destination IP address and port 8080 as the source or destination port. Which command should you use?
Q: Complete the Qwiklab Introduction to tcpdump before answering this question. You want to use tcpdump to retrieve packets with 113.8.81.2 as the source or destination IP address and port 8080 as the source or destination port. Which command should you use? or Q: Prior to responding, finish the Qwiklab Introduction to tcpdump. To recover packets with source or destination…