Ip security - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Ip security? On this page you'll find 4824 study documents about Ip security.
Page 2 out of 4.824 results
Sort by
-
GSEC 401.2 Defense-In-Depth Exam QUESTIONS AND EXPERT REVISED ANSWERS >> ALREADY PASSED
- Exam (elaborations) • 11 pages • 2024
-
- $12.39
- 1x sold
- + learn more
GSEC 401.2 Defense-In-Depth Exam QUESTIONS AND EXPERT REVISED ANSWERS >> ALREADY PASSED 
 
 
What are 5 layers of Defense-in-depth security? - Answer -Perimeter 
Network 
Host 
Application 
Data 
 
What is risk? - Answer -Risk is the probability of a threat crossing or touching a vulnerability 
 
Formula for risk - Answer -Threats x Vulnerabilities = Risk 
 
CIA triad - Answer -Confidentiality, Integrity, Availability 
 
What is the foundation of defense-in-depth? - Answer -filtering 
 
Na...
-
WGU D481 – SECURITY FOUNDATIONS QUESTIONS WITH COMPLETE ANSWERS UPDATED
- Exam (elaborations) • 10 pages • 2024
- Available in package deal
-
- $9.99
- 1x sold
- + learn more
WGU D481 – SECURITY FOUNDATIONS QUESTIONS WITH COMPLETE ANSWERS UPDATED 
 
 
1. Compare and contrast the TCP/IP model with the OSI model. How are they different? How are they similar? 
· OSI is more complex 
o Physical, data, network, transport, session, presentation, application 
 
· TCP/IP is more used today 
o Application, transport, internet, network access layers 
What are the major differences between circuit-switched, packet-switched, and IP-based communications? 
· Circuit = telepho...
-
SANS GISCP and GIAC Exam Questions With 100% Correct Answers
- Exam (elaborations) • 50 pages • 2024
-
- $14.49
- 1x sold
- + learn more
SANS GISCP and GIAC Exam Questions 
With 100% Correct Answers 
Ack Piggybacking - answerThe Practice of sending an ACK inside another packet going to 
the same destination 
Address resolution protocol - answerProtocol for mapping an IP address to a physical 
machine address that is recognized on the local network. 
A table, usually called the ARP cache, is used to maintain a correlation between each MAC and 
its corresponding IP address 
What are the five threat vectors? - answerOutside attack f...
-
Nocti Practice Test (RMCTC ITA) Questions With Complete Solutions
- Exam (elaborations) • 26 pages • 2023
-
- $14.99
- 1x sold
- + learn more
The unauthorized copying of software is referred to as: correct answer: Pirated Software 
 
There are images online that you want to use. The website states that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what? correct answer: Public Domain 
 
The best security for passwords is: correct answer: Memorize it 
 
Eight bits equal how many bytes? correct answer: 1 
 
One megabyte equals how many bytes? correct an...
-
INSY-3303 FINAL EXAM STUDY GUIDE WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 13 pages • 2024
- Available in package deal
-
- $12.49
- 1x sold
- + learn more
INSY-3303 FINAL EXAM STUDY GUIDE 
WITH COMPLETE SOLUTIONS 
Access Point - Answer- The computer or network device that serves an as interface 
between devices and the network 
Application Architecture - Answer- The way in which the functions of the applications 
layer software are spread among the clients and servers in the network 
Attenuation - Answer- Loss of power in a signal as it travels from the sending device to 
the receiving device 
BN - Answer- Known as Backbone Network 
Routed backbon...
Want to regain your expenses?
-
FEDVTE ENTERPRISE CYBERSECURITY OPERATIONS EXAM REVIEW QUESTIONS AND ANSWERS, RATED A+
- Exam (elaborations) • 5 pages • 2024
-
- $9.49
- 1x sold
- + learn more
FEDVTE ENTERPRISE CYBERSECURITY OPERATIONS 
EXAM REVIEW QUESTIONS AND ANSWERS, RATED A+ 
The internal audit department is investigating a possible accounting breach. One of the auditors is sent 
to interview the following employees: Employee A works in the accounts receivable office and is in 
charge of entering data into the finance system; Employee B works in the accounts payable office and is 
in charge of approving purchase orders; Employee C is the manager of the finance department, 
su...
-
C840 5 question n answers already passed 2023
- Exam (elaborations) • 33 pages • 2023
-
- $17.99
- 1x sold
- + learn more
C840 5What term describes data about information, such as disk partition structures and files tables? 
Metadata 
 
 
 
Data stored as written matter, on paper or electronic files 
Documentary Evidence 
 
 
 
Most common protocol used at OSI layer 3 
IP 
 
 
 
ACT passed to improve the security and privacy of sensitive information in federal computer systems. Law establishes minimum acceptable security practices, creation of computer security plans, and training of system users and owners of faci...
-
Security Foundations - D481 Exam Questions And Answers
- Exam (elaborations) • 5 pages • 2024
- Available in package deal
-
- $9.99
- 1x sold
- + learn more
Security Foundations - D481 Exam Questions And Answers 
 
 
Desktop computers are connected to the building backbone in the wiring closet. What is another name for this wiring closet? - ANS Intermediate distribution frame (IDF) 
 
802.3-1983 - ANS 10Base5 
 
802.3a-1985 - ANS 10Base2 
 
802.3i-1990 - ANS 10Base-T 
 
802.3j-1993 - ANS 10Base-F 
 
802.3af-2003 - ANS PoE 
 
Most modern networks follow the 802.3 standard. This standard offers technical solutions to business needs....
-
WGU C172: Network and Security Foundations - Exam Questions and Answers 2023/2024 (Rated A+ Guaranteed Success)
- Exam (elaborations) • 65 pages • 2023
-
- $21.49
- 1x sold
- + learn more
WGU C172: Network and Security Foundations - Exam Questions and Answers 2023/2024 (Rated A+ Guaranteed Success). Application Layer(7th layer) - ans Interacts with application programs that 
incorporate a communication component such as your internet browser and 
email (provides user interface) 
Bus Topology - ans The computers share the media (coaxial cable) for 
data transmission 
CAT6 (category 6) - ans Twisted-pair cables capable of carrying up to 
1000Mbps (1 gigabit) of data up to a length ...
-
WGU D315 Network and Security Foundation Questions + Answers Graded A+
- Exam (elaborations) • 5 pages • 2023
-
- $10.99
- 4x sold
- + learn more
WGU D315 Network and Security Foundation Questions + Answers Graded A+
How much did you already spend on Stuvia? Imagine there are plenty more of you out there paying for study notes, but this time YOU are the seller. Ka-ching! Discover all about earning on Stuvia