ifconfig lets you configure your interface if status shows the status of network interfaces ifup and ifdown command to toggle interfaces on or off route lets you see routing table or create static routes ip to replace ifconfig, but not very popular netcat swiss army knife does a lot but poorly. Bad web browser, port […]

Read More →

TCP/IP     Transmission Control Protocol   Internet Protocol Subnet Mask A number that, when compared with a network address number, will block out all but the necessary information.   Only the significant numbers will be displayed.   example  XXX.XXX.XXX.YYY   Only the Y’s will show.  Default Gateway A gateway is a node (a router) […]

Read More →

The categories of laws in the U.S. are: a.Civil, criminal, administrative, and family c.Criminal, civil, and administrative b.Intellectual, privacy, and computer crime d.Criminal, civil, and family c.Criminal, civil, and administrative Trademarks, copyrights, and patents are all a part of: a.Intellectual property law c.Administrative law b.Civil law d.Private property law a.Intellectual property law An organization has […]

Read More →

What is the correct approach for addressing security and organization objectivesa.Security and organization objectives should be developed separately b.Security should drive organization objectives c.Security should support support organization objectives d.The site security officer should approve or reject organization objectives c.Security should support support organization objectives The two components of risk management are: a.Risk assessment and […]

Read More →

When two or more RFCs cover the same topic, they usually also share the same title. True RFC 3300 describes how an RFC is created and what processes it must go through to become an official standard, adopted by the IETF. False A divide and conquer approach permits concerns related to networking hardware to be […]

Read More →

Neighbor Discovery has five functional processes. True Upon start-up, Neighbor Discovery collects information about how nodes configure their IPv6 addresses to communicate on the network. False Neighbor Discovery makes abundant use of messages. False ND takes over the functions that ARP and Reverse ARP handled in IPv4. True Home Agents may include the Home Agent […]

Read More →

In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers. True Advances in NIC technology are making this hardware smarter than ever. True It is best to perform connectivity tests on a computer connected to a live network. False Bridges are protocol independent. […]

Read More →

What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.) data encoding message size delivery options Which two message timing mechanisms are used in data communications? (Choose two.) response timeout, flow control What happens when two devices on the same subnet are communicating? The host […]

Read More →

Threat a potentially negative occurrence Confidentiality seeks to prevent the unauthorized disclosure of information: it keeps data secret Integrity seeks to prevent unauthorized modification of information. In other words, integrity seeks to prevent unauthorized write access to data. Integrity also seeks to ensure data that is written in an authorized manner is complete and accurate. […]

Read More →

Level D Minimal Protection Level C Discretionary Protection Level C1 Discretionary Security Protection Level C2 Controlled Access Protection Level B Mandatory Protection (DOD Security Clearances) Level B1 Labeled Security Level B2 Structured Protection Level B3 Security Domains Level A Verified Protection Level A1 Verified Design

Read More →