Blurtit.
  • Ask
  • Topics
  • Discover
  • Sign in
  • Questions
  • Popular
Anonymous
Anonymous asked 8/25/2010
What is the role of extranet?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/25/2010
A great advantage of a VPN is that it pro Which of the following would NOT be a possible vulnerability or exploit that may lead to an attacker by-passing the firewall?vides ____________ communications over _____________ networks?
  • 2 Answers
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/13/2010
Susan will be configuring a snort network IDS sensor to monitor her subnetwork. She will be using a web-based console interface to manage the IDS system, and will need to configure an _____________________ to store the alert data recorded by the snor?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/12/2010
Gary needs a specialized IPS to limit his exposure to SQL injection attacks against his web server exposed to the public network. He should consider purchasing an ____________?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/12/2010
Richard wants to modify his current network IDS solution to allow his sensor to stop unwanted activity, turning it into an IPS. Richard should replace his passive TAP with an ______________ to allow his sensor to terminate unwanted?
  • 3 Answers
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/8/2010
What is the most common type of home network?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/5/2010
Richard wants to modify his current network IDS solution to allow his sensor to stop unwanted activity, turning it into an IPS. Richard should replace his passive TAP with an ______________ to allow his sensor to terminate unwanted connections?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/3/2010
Which Of The Following Would NOT Be A Possible Vulnerability Or Exploit That May Lead To An Attacker By-passing The Firewall?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/2/2010
Which Two Factors Contribute To The Increased Throughput When All Nodes Of A LAN Are Connected To A Switch Instead Of A Hub?
  • 2 Answers
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/1/2010
Refer To The Exhibit. A Network Administrator Configures A Static Route On Router R1 To Reach The 192.168.1.0/24 Network. Which IP Address Should Be Used As The Next-hop Address In The Ip Route Command?
  • 2 Answers
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 8/1/2010
Norman Is Looking Into An IDS/IPS Solution For His Command. The Network Engineers Recommended He Select A Solution That Requires Packets To Pass In And Out Of The Device, And That It Be Connected In Series With The Outbound Traffic Flow. Norman Shoul?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 7/28/2010
Aided By The U.S. PATRIOT Act To Provide More Flexibility, This Act Requires Law Enforcement Agents To Obtain A Court Order To Monitor Traffic Flowing Between Network Service Providers?
  • 2 Answers
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 7/25/2010
What Information Is Pertinent For Network Layout And Hardware Configuration?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 7/22/2010
Which Firewall Operates At The Highest Level Of The OSI Model?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 7/21/2010
How Network Impact Daily Life?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 7/16/2010
DoDD 8500.01E Specifies Three Mission Assurance Categories. These MAC Categories Reflect The Importance Of Information Relative To The Achievements And Objectives Of The War Fighter. The Categories Are Primarily Used To Establish The Requirements For?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 7/3/2010
What Are The Different Network Media?
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 6/24/2010
Is The Transmission Medium A Part Of The Physical Layer? Why Or Why Not
  • 1 Answer
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 6/16/2010
How Does A DMZ Enhance Network Security For An Organization?
  • 2 Answers
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
Anonymous
Anonymous asked 6/12/2010
What Is The Difference Between Data Link Layer And Transport Layer In Computer Networks?
  • 2 Answers
  • Follow
  • Blurt
  • Favorite
  • 0
  • 0
  • 0
followed this question.
blurted this question.
favorited this question.
  • <<
  • <
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • >
  • >>
Computer Networks
Follow
Computer Networks
  • 441 Questions
  • 17 Followers

Share This Topic

  • Facebook
  • Twitter
  • Google+

  • All Topics
  • Technology
  • Computers
  • Computer Networks

Questions

  • Ask
  • Topics
  • Discover

Company

  • About
  • Contact
  • Support

Everything Else

  • Terms Of Use
  • Privacy Policy
  • Cookie Policy

Follow Us

Social Networks

  • Blurtit on Facebook
  • Blurtit on Twitter
  • Blurtit on Google+
Blurtit.

© Blurtit Ltd. All rights reserved.