среда, 11 ноября 2015 г.

CIS 329 WEEK 6 QUIZ


  • Question 1
2 out of 2 points
  
 
What is the largest danger that high-capacity removable storage devices pose to an enterprise network?
Answer
   

 
   
  • Question 2
0 out of 2 points
  
 
When none of your configured Software Restriction Policies are matched, what happens?
Answer
   

 
   
  • Question 3
2 out of 2 points
  
 
When using the Allow/Prevent installation of devices that match any of these device IDs setting in the Device Installation Restrictions folder of a GPO, what other setting must you ensure you also configure to provide the intended results?
Answer
   

 
   
  • Question 4
2 out of 2 points
  
 
In order to use the Custom Classes: Deny read/write access setting of the Removable Storage Access policy settings, what will you need to know about each device to which you wish to allow read or write access?
Answer
   

 
   
  • Question 5
2 out of 2 points
  
 
Software restriction policies can work in three ways, based on the settings you choose for each of the rules. Which of the following is not one of the settings to choose from?
Answer
   

 
   
  • Question 6
2 out of 2 points
  
 
The process of applying a header and footer to a data packet is known as what?
Answer
   

 
   
  • Question 7
0 out of 2 points
  
 
What protocol is responsible for the end-to-end transmission of a packet, to its final destination on a network?
Answer
   

 
   
  • Question 8
2 out of 2 points
  
 
In the OSI model, which layer is at the bottom and represents the hardware that forms the network?
Answer
   

 
   
  • Question 9
0 out of 2 points
  
 
Most cabled networks today use what type of cabling?
Answer
   

 
   
  • Question 10
2 out of 2 points
  
 
What protocol do most devices currently use at the Network layer?
Answer
   
    
  • Question 11
0 out of 2 points
  
 
What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network?
Answer
   

 
   
  • Question 12
2 out of 2 points
  
 
A 2x2 MIMO device has how many total transceivers?
Answer
   

 
   
  • Question 13
2 out of 2 points
  
 
Why should you not deploy a wireless network using WEP for security?
Answer
   

 
   
  • Question 14
2 out of 2 points
  
 
802.11n wireless networking equipment uses two, three, or more different frequencies for transmission and the subsequent receiving of traffic. The sending system splits its data into multiple signals for transmission, and the receiving device reassembles the signals into a single data stream. What is the name of this process?
Answer

Комментариев нет:

Отправить комментарий