This class was created by Brainscape user Jaspreet Matharu.

By:

Decks in this class (22)

Questions
Malware and its effects 1,
How to mitigate against malware 2,
Explain what each of the logical ...
58  cards
Chapter 1 Questions
What method can be used to mitiga...,
What are the three major componen...,
Which statement accurately charac...
24  cards
Chapter 2 Questions
Which two characteristics apply t...,
Which three types of views are av...,
If aaa is already enabled which t...
25  cards
Chapter 3 Questions
A user complains about not being ...,
When a method list for aaa authen...,
Which solution supports aaa for b...
23  cards
Chapter 4 Questions
In addition to the criteria used ...,
A router has been configured as a...,
Refer to the exhibit if a hacker ...
25  cards
Module 1-4 Questions
Which security measure is typical...,
Which statement accurately charac...,
Which security technology is comm...
73  cards
Modules 5-7
Which privilege level is predefin...,
What is a requirement to use the ...,
Which three items are prompted fo...
65  cards
Modules 8-10
When creating an acl which keywor...,
Which two pieces of information a...,
What two steps provide the quicke...
49  cards
Modules 13-14
Why are traditional network secur...,
What two internal lan elements ne...,
What are two examples of traditio...
52  cards
Firewalls
Which statement describes the cha...,
When an ios zone based firewall p...,
A firewall is a filtering device ...
47  cards
Tutorial 6
4 which statement describes the c...,
When a ios zone based firewall po...,
A firewall is a filtering device ...
11  cards
Modules 11-12
What are two characteristics of b...,
What is an advantage of using an ...,
What is a characteristic of an ids 3
22  cards
Modules 15-17
Which algorithm can ensure data i...,
What is the keyspace of an encryp...,
Alice and bob are using a digital...
24  cards
Modules 18-19
Which two statements describe the...,
What technology is used to negoti...,
What are the two modes used in ik...
22  cards
Modules 20-22
A network analyst wants to monito...,
What are three characteristics of...,
What testing tool is available fo...
21  cards
Network Security Practice Final
Which two statements are true abo...,
When dynamic nat on an asa is bei...,
Which protocol uses x509 certific...
64  cards
Tutorial Week 9
1 what are the four main function...,
Research the benefits limitations...,
What are the major differences be...
13  cards
Tutorial 8
You must secure email traffic bet...,
There are several methods for cra...,
What are the primary objectives o...
24  cards
Tutorial 7
Firewalls and sensors use differe...,
Snort has the capability to analy...,
An ips sensor has two critical co...
10  cards
Mock Theory A
Threats can be identified in one ...,
An ips sensor has two critical co...,
Snort has the capability to analy...
14  cards
Internet Security Theory Exam 22/23
An ips sensor has two critical co...,
Threats can be identified in one ...,
Blank 3
15  cards
Internet Secuirty Theory Exam 25-26
A what are four key strategies an...,
Explain how a dhcp spoofing attac...,
Explain what a cam table mac addr...
15  cards

More about
Network Security

  • School Unspecified
  • Program type Unspecified
  • Course Unspecified
  • Instructor Unspecified
  • Standards Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Network Security
  • 16 decks
  • 448 flashcards
  • 127 learners
Decks: Chapter 15, Chapter 14, Chapter 13, And more!
Network+
  • 36 decks
  • 800 flashcards
  • 192 learners
Decks: Osi Model, Soho Routers, Ethernet Cabling, And more!