CIS 175 help Making Decisions/uophelp.com CIS 175 help Making Decisions/uophelp.com | Page 4
• Question 35
Which of the approaches is used to determine the password of a system
account or a user account? (Choose 2)
• Question 36
Which of the following is NOT an example of an integrity violation?
• Question 37
Which of the following is a firewall device type? (Choose 2)
• Question 38
What type of integrity attack is described in the diagram below?
• Question 39
What are the three primary goals of network security?
• Question 40
What are the three types of malicious traffic detection methods?
• Question 41
What type of availability attack is described in the diagram below?
• Question 42
________ can occur when an analog connection creates an
electromagnetic field around its conductors, inducing its waveforms on a
nearby analog connection.
• Question 43
What is the administrative distance of Routing Information Protocol
(RIP) routing protocol?
• Question 44
Which of the following is a common OSI Layer 3 (network layer)
troubleshooting issue? (Choose 2)
• Question 45
Look at the topology shown below. What is the design issue with this
wireless network?
• Question 46
Consider the network diagram presented below, let’s assume that both
switches are capable of auto negotiating Ethernet speeds of 10, 100, and
1000 Mbps. Let’s also assume the switches do not support MDIX.
Refer to the network diagram. Identify what the Layer 1 issue would be
in this topology.
• Question 47