Chapter 16 – IT Essentials
01. Which two advanteges are attributed to a hardware firewall when compared to a software firewall?(chose two)
01. Which two advanteges are attributed to a hardware firewall when compared to a software firewall?(chose two)
- It costs less because it is more efficient;
- It does not impact the processing performance of the equipment it protects;
- It always protects both the computer it is installed on as well as the rest of the network;
- It is designed to protect more than one computer;
- It is a free windows operating system component.
- To protect the operating system;
- To limit physical acces to a network;
- To define acceptable computer usage within an organization;
- To identify appropriate hardware firewalls that are used to filter incoming data.
- A single USB connection to a computer can support up to 255 separate devices;
- It offers rates of around 580Mb/sec in low-speed mode;
- It allows up to 920Mb/sec in the 2.0 version;
- It can supply power from the computer to devices.
- ARP
- DLC
- MD5
- NTP
- SHA
- TCP
- Infrastructure;
- Network access;
- Operating system version;
- Type of backup and restore utility that is used;
- Type of Layer2 devices that are used within the network.
- Paperwork that is provided to customers;
- The manufacturer FAQ for network devices;
- Firewall logs;
- Network device logs;
- Technical websites.
- Biometris device;
- Security key fob;
- Smart card;
- Thumb drive.
- Smart card;
- Security key fob;
- Storage area network;
- Biometric device.
- The backup files have the extension .zip;
- The source and target drive volumes must be NTFS;
- The maximum size of a single backed up file is 450MB;
- The backup files can be saved to another connected computer or server;
- The backup files have an extension of .bkt and a maximum uncompressed file size of 200MB.
- The change provides a minimum level of security to the access point;
- The change reduces the chance of the wireless network being detected;
- It decreases the chance of interference from a nearby wireless device;
- It secures the wireless network by requiring all devices that access the wireless network to provide the new username and password.
- WEP
- WPA2
- Port triggering;
- Port forwarding;
- MAC address fitering.
- The firewall is disabled by default;
- The firewall can be modified using the Network control panel;
- The firewall can be managed manually by permiting or allowing specific ports;
- The firewall blocks Windows Vista and Internet Explorer updates by default.
- The Internet browser needs updating;
- The computer has been infected with spyware;
- The automatic software firewall settings have been disabled;
- The automatic scan feature of the antivirus software has been disabled.
- Enable WEB filtering;
- Disable WAP monitoring;
- Disable SSID broadcast;
- Disable MAC filtering.
- The user is logged in to the account;
- The account has been disabled;
- The administrator does not have the correct permissions to take the change;
- The user has violated a security policy, and the result is that the account has been deleted.
- Give the person rights to the CIW folder;
- Allow the user to authenticate into a guest account;
- Add the user to a group that has the rights to the CIW folder;
- Permit the user to add the folder to the TEMP folder in Users and Computers;
- Enable UAC on the computer so that the user can change the rights to the CW folder.
- The placement of all software firewalls;
- The types of intrusions that are covered by the policy;
- A schedule that lists timing of operating system updates;
- The priority of services to be restored after an emergency is over.
- A backup schedule;
- Expense of the security protection;
- The costs that are associated with data loss;
- The types of computers that populate the LAN;
- The operating systems that are used by the host computers.
- Archive;
- Backup;
- Compress;
- Ntbackup;
- Zip
- Computers on a corporate network perform well whithout automatic updates because they are protected by a firewall;
- Home users should avoid automatic updates because they are protected by Windows Internet Connection Firewall;
- Users accesing the network using a dial-up connection need to control when the updates are downloaded and installed;
- Guest user accounts with limited access are unlikely to ever need updates because they are temporary users.
0 Response to "Kunci Jawaban Cisco IT Essentials Chapter 16"
Post a Comment
untuk berkomentar:
1. setelah Anda membaca artikel ini anda wajib komentar
2. komentar anda sangat saya harapkan
3.komentar anda sangatlah penting demi kemajuan blog kita
4. komentar anda bagaikan berlian yang tak ternilai harganya
5. Cantumkan link blog anda apabila anda berkomentar, agar blog anda ikut naik trafic nya