What are network attacks that bypass the firewall?
a. Identification spoofing and tunneling. b. Tunneling and application-based attacks. c. Second message encryption and identification spoofing d. Application-based attacks and second message encryption 49. What do we call frames that consist of garbled bits of data that are transmitted continuously on the network? a. Dribbles b. Jabbers c. Collision d. network storm 50. What alarm browser category indicates if an alarm is related to other alarms? a. Cor b. Ack. c. Severity d. Source 51. What is the only approved method for sanitizing magnetic media? a. Overwriting. b. Degaussing. c. Formatting. d. Deleting. 52. What type of user profile is specified within the User Manager for Domains environment profile settings and is downloaded from the server every time the user logs in? a. Local profiles b. User profiles c. Roaming profiles d. Default profiles 53. When accessing devices through the Network Management System, what community string gives you the ability to change the device settings