What are the two important needs that need to be balanced in a network?
(1) Keep networks open to support business requirements (2) Protect private, personal, and business information
Learn More :
CISCO
- What are five examples of configuration weaknesses?
- What are three examples of Technological Weaknesses?
- What are the 3 factors of network security?
- What are the three primary vulnerabilities?
- What three goals must a security policy meet?
- What is an extreme alternative for managing security?
- Examples of commonly reported acts of computer crime.
- What is the seven-step process to gain information and state an attack?
- Uses e-mail or other means to trick others into providing information, such as credit card numbers.
- An individual who sends large quantities of unsolicited e-mail messages.
- Individual who manipulates phone network, through a payphone, to make free long distance calls.
- Someone who tries to gain unauthorized access to network resources with malicious intent.
- An individual that attempts to gain unauthorized access to network with malicious intent
- An individuals who use their knowledge to break into systems that they are not authorized to use
- An individual who looks for vulnerabilities in systems and reports these so that they can be fixed
- What are the possible consequences if a network is compromised?
- What are two examples of when you would use static address mapping?
- Supplying a manual static mapping for the next hop protocol address to a local DLCI.
- What relies on Inverse ARP to resolve a next hop network protocol address to a local DLCI value.
- Explain the problem with NBMA networks in routing and explain how this problem can be fixed
- Explain the problem with frame relay and routing loops
- What device in frame relay is the DTE
- Negotiated tariff metric in Frame Relay internetworks. The maximum amount of data (in bits) that a Frame Relay internetwork is committed to accept the transmit at the CIR
- Negotiated rate above the CIR which the customer can use to transmit for short bursts
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.