Words of Wisdom:

"(::) cookies yay!!!!!!!!!!!!!1" - Cozy

Sec 450 Final Examination Answers

  • Date Submitted: 10/17/2016 11:21 PM
  • Flesch-Kincaid Score: 62 
  • Words: 816
  • Essay Grade: no grades
  • Report this Essay
SEC 450 Final Examination Answers
Follow Below Link to Download Tutorial
https://homeworklance.com/downloads/sec-450-final-examination-answers/

For More Information Visit Our Website (   https://homeworklance.com/   )

Email us At: Support@homeworklance.com   or lancehomework@gmail.com

Question 1. 1. (TCO 1) The component of network security that ensures that authorized users have access to data and network resources is _____. (Points : 6)
data integrity
data confidentiality
data and system availability
data and user authentication


Question 2. 2. (TCO 1) The type of security control that makes use of firewalls is called _____. (Points : 6)
administrative
physical
technical
clerical


Question 3. 3. (TCO 2) To configure a role-based CLI on a Cisco router, the first command to enter in privileged mode is _____. (Points : 6)
parser view
view enable
enable view
config view
super view


Question 4. 4. (TCO 2) The show running-config output can be modified using all of the following pipes except for _____. (Points : 6)
| begin
| end
| include
| exclude


Question 5. 5. (TCO 3) Which of the following is the default number of MAC addresses allowed when you execute the switchport port-security command on a switch port? (Points : 6)
Zero
One
Two
Three


Question 6. 6. (TCO 3) Which switch feature causes a port to skip the listening and learning states, causing the port to enter the forwarding state very quickly? (Points : 6)
fastport
portfast
enablefast
portforward


Question 7. 7. (TCO 4) With zone-based firewalls, which of the following is used to specify actions to be taken when traffic matches a criterion? (Points : 6)
Zones
Class maps
Policy maps
Zone pairs


Question 8. 8. (TCO 4) Which type of access list uses rules placed on the interface where allowed traffic initiates and permits return traffic for TCP, UDP, SMTP, and other protocols? (Points : 6)

Established
Lock and key
Reflexive...

Comments

Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments