Module 5: Network Protocols Quiz Answers

1. A host is transmitting a broadcast. Which host or hosts will receive it? a specially defined group of hosts all hosts in the same network all hosts on the Internet the closest neighbor on the same network 2. Which statement describes a characteristic of cloud computing? A …

Module 4: Linux Basics Quiz Answers

1. Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities? intrusion detection system malware analysis PenTesting firewall 2. What is a benefit of Linux being an open source operating system? Linux distribution source code can be modified and …

1.4.2 Module 1: The Danger Quiz Answers

1.4.2 Module 1: The Danger Quiz Answers 1. An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack? probing open ports on the firewall on the border network searching and obtaining trade secrets cracking …

1.6.6 Check Your Understanding – Reliable Networks Answers

1.6.6 Check Your Understanding – Reliable Networks 1. When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? fault tolerance Scalability QoS Security 2. Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? …