Posts

Showing posts with the label Questions

नवीन पोस्ट..

Internet Threat Perspectives Quiz Answers NSE 1 Information Security Awareness Fortinet

Image
  Internet Threat Perspectives Quiz Answers NSE 1 Information Security Awareness  Fortinet Question 1: Select two good travelling habits for protecting your portable device. (Choose two.) • Avoid Joining unknown Wi-Fi networks • Join only Wi-Fi networks from recognizable brands, such as starbucks • Turn off automatic security software updates • Encrypt all sensitive data Question 2: You receive an email from your bank. It states that someone has your password and that you must take immediate action by clicking the link provided.What should you do? • Click the link and change your password. Time is of the essence • Scour the emal for speling mistakes, if there are none, then the email is legitimate and you can dick the link. • Delete and report it to the bank by using the contact information found on their website. • Reply to the email to confirm that they have the correct account by providing your bank account number Question 3: Which precaution should you take if you r...

Fortinet NSE 1 Lesson2-CIO Perspectives Quiz

Image
 Fortinet NSE 1 Lesson2-CIO Perspectives Quiz FORTINET. E Certifications NSE 1 Lesson 2 Quiz Answers CIO Perspectives Q: How does implementing multiple security peint products frees multiple vendors affect managing an environment? Select one  Requires fewer staff members. More complicated and more expensive. Saves money on rackspace and cooling costs. Simpler and less expensive. Q2. Internally to the CIO's company, what is the overall impact when a cyber attack caunas extended to d employen time is diverted to post-attack activities? Select one Productivity is reduced . Marale is increased Productivity is increased. Overtime pay is approved. Qs. On average, how can a CIO's tenure be characterized? Select one: CIOs have the longest tenures among C-level executives. The tenure of a CIO is generally stress-free and relaxing. CIOs have the shortest tenures among C-level executives. The tenure of a CIO is a step on the path to CFO. Q4. Regulatory fines related to serious breaches c...

Password Perspectives Quiz Answers Nse 1 Information Security Awareness Fortinet

Image
 Question 1: Which practice should you implement for backups? • Encrypt the backup data for an extra layer of protection. • Keep a backup device physically connected to the host • Use multiple backup vendors for redundancy. • Always back up your data in the cloud. Question 2: Which rule is best to follow for securing passwords? • Use a combination of seemingly random upper and lowercase letters, numbers, and special characters that is easy to remember but difficult to guess. • Never leave your password on a sticky note stuck to your monitor. Instead, hide under your keyboard. • Use something that you would never forget, like the name of your family pet. • Use a predictable pattern of numbers or letters. Question 3: Which two characteristics are examples of poor passwords? (Cho two.) A predictable sequence of numbers or words A commonly used word or unchanged default password A memorable passphrase written as a random sequence of keyboard keys A combination of random letters, numbe...

CCNA Routing basic interview Question and answers Part 2

Image
CCNA Routing Basic Interview Question & Answers Part  2   Q26. Explain what is a source route? Ans. The source route is defined as a sequence of IP addresses that are used to identify the route of a datagram. You can also involve the source route in the IP datagram header.   Q27. What is the difference between ‘standard’ and ‘extended’ ACL (access control list)? Ans. Standard ACLs are source-based, whereas extended ACLs are source- and destination-based.   Q28. What is data encapsulation? Ans. Data encapsulation is the process of breaking down information into smaller, manageable chunks before their transmission across the network.   Q29. What is RAS? Ans. RAS (Remote Access Services) refers to any combination of hardware and software to enable remote access to tools or information that typically reside on a network of IT devices.   Q30. Mention the different network protocols that are supported by Windows RRAS services? Ans. Following are the three mai...

CCNA Routing basic Interview Question and answers Part 1

Image
 What is a Computer Network? ...   A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.  What are the different types of networks? Considering the size or span of a network, we can classify them as follows: PAN (Personal Area Network) – PAN is made up of devices used by a single person. It has a range of a few meters. WPAN (Wireless Personal Area Network) – It is a PAN network that uses wireless technologies as a medium. LAN (Local Area Network) – LAN is a network whose range is limited to a relatively small area, such as a room, a building, an airplane, etc. WLAN (Wireless Local Area Network) – WLAN is a LAN network that uses wireless means of communication. It is a widely used configuration due to its scalability and because it does not require the installation of cables. CAN (Campus Area Network) – A network of hig...

Fortinet NSE 1 Lesson2-CIO Perspectives Quiz

Image
Fortinet NSE 1 Lesson2-CIO Perspectives Quiz |   HOW DOES IMPLEMENTING  multiple security point products from multiple vendors affect managing an environment Select one: Requires fewer staff members. More complicated and more expensive. Saves money on rackspace and cooling costs. Simpler and less expensive. Qz. Internally to the ClO’s company, what is the overall impact when a cyber attack causes extended downtime, and employees’ time is diverted to post-attack activities? Select one: Productivity is reduced. Morale is increased. Productivity is increased. Overtime pay is approved. Q3. On average, how can a CIO’s tenure be characterized? Select one: cios have the longest tenures among c-level executives the tenure of a cio is generally stress-free and relaxing CIOs have the shortest tenures among c-level executives The tenures of a cio is a step on the path to CFO Q4.  Regulatory fines related to serious breaches can be characterized in which way They can be enormous and ...

Fortinet Internet Threat Perspectives Quiz Answers Fortinet NSE 1 Information Security Awareness Fortinet - Everything Trending

Image
  Internet Threat Perspectives Quiz Answers Fortinet NSE 1 Information Security Awareness Fortinet - Everything Trending   Internet Threat Perspectives Quiz Answers NSE 1 Information Security Awareness Fortinet Question 1: Select two good travelling habits for protecting your portable device. (Choose two.)  Avoid joining unknown Wi-Fi networks  Join only Wi-Fi networks from recognizable brands, such as Starbucks  Turn off automatic security software updates  Encrypt all sensitive data Question 2: You receive an email from your bank. It states that someone has your password and that you must take immediate action by clicking the link provided. What should you do?  Click the link and change your password. Time is of the essence.  Scour the email for spelling mistakes. If there are none, then the email is legitimate and you can click the link.  Delete and report it to the bank by using the contact information found on their website.  Reply ...

CCNA security Interview Questions And Answers

Image
CCNA security Interview Questions What do you see as the objective of information security within a business or organization? A: Network security should: Ensure uninterrupted network availability to all users Prevent unauthorized network access Preserve the privacy of all users Defend the networks from malware, hackers, and DDoS attacks Protect and secure all data from corruption and theft Q: How do you define risk, vulnerability, and threat, in the context of network security? A: A risk is defined as the result of a system being secure but not secured sufficiently, thereby increasing the likelihood of a threat. A vulnerability is a weakness or breach in your network or equipment (e.g. modems, routers, access points). A threat is the actual means of causing an incident; for instance, a virus attack is deemed a threat. Q: What are the possible results of an attack on a computer network? A: Possible results include: Loss or corruption of sensitive data that is essential for a company’s s...

CCNA Interview Basic Questions And Answers

Image
  CCNA  Interview Basic QuestionsAnd Answers CCNA Interview Question 1)What  is Routing? Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices. 2) What is the purpose of the Data Link? The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing. 3) What is the key advantage of using switches? When a switch receives a signal, it creates a frame out of the bits that were from that signal. With this process, it gains access and reads the destination address, after which it forwards that frame to the appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports. 4) When does network congestion occur? Network congestion occurs when too many users are trying to use the same bandwidth. This is especially true in big networks that do not resort to network s...