Ccna certification Practice Tests



Download 8,04 Mb.
Pdf ko'rish
bet493/559
Sana28.08.2021
Hajmi8,04 Mb.
#157675
1   ...   489   490   491   492   493   494   495   496   ...   559
Bog'liq
dumpccna 200-301 mavzulashtirilgan test

355

 100.  C.  The command 

ip ftp username USER will configure the username USER for FTP 

connections. The command 

ip ftp password USERPASS will configure the password 

USERPASS for FTP connections. The command 

ip ftp username USER password 

USERPASS is incorrect. The command ftp USER password USERPASS is incorrect. The 

command 


username USER password USERPASS is incorrect.

Chapter 5: Security Fundamentals 

(Domain 5)

 1.  B.  The perimeter area, or perimeter network, is outside of the corporate firewall. The 

perimeter area generally holds equipment necessary for routing to the ISP. The DMZ is in 

between the perimeter network and the internal network. The internal area is the area or 

network inside of your organization. A trusted area is an area or network that has a high 

level of trust; generally your internal area is a trusted area.

 2.  A.  The DMZ is an area that is protected by the corporate firewall. The DMZ area is in 

between the perimeter network and the internal network. However, it allows servers such 

as web servers, email servers, and application servers to be accessible via the Internet. 

The perimeter area, or perimeter network, is outside of the corporate firewall. The 

perimeter area generally holds equipment necessary for routing to the ISP. The internal 

area is the area or network inside of your organization. A trusted area is an area or 

network that has a high level of trust; generally your internal area is a trusted area.

 3.  C.  An intrusion prevention system, or IPS, can detect and prevent attacks based on 

their signature. They are commonly found in firewall systems such as Firepower Threat 

Defense (FTD) devices. Honey pots are server or network appliances that have been 

security weakened to attract bad actors so their actions and tactics can be examined. 

An IDS is a system that can detect an attack based upon a signature. They too are found 

in firewall systems such as FTD devices. Although similar to an IPS, the IDS will only 

notify someone in the event of a detection. A host intrusion detection system (HIDS) is an 

application that runs on a host to detect intrusions. A HIDS is similar to an IDS, but it is 

all software based and resides on the host it is to protect.

 4.  A.  The internal network is defined by the firewall. Anything protected by the firewall on 

the internal network is considered to be the trusted network. The Internet is an untrusted 

network, because it is outside of your control and outside of your organization. The DMZ 

area is in between the perimeter network and the internal network. A network with SSL 

encryption is not considered trusted; it is considered encrypted. A network with SSL can 

travel over an untrusted network such as the Internet.





Download 8,04 Mb.

Do'stlaringiz bilan baham:
1   ...   489   490   491   492   493   494   495   496   ...   559




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish