Exam 13: Network Protection Systems

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What router feature provides basic security by mapping internal private IP addresses to public external IP addresses,essentially hiding the internal infrastructure from unauthorized personnel?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

Match each item with a statement below. -Administrator can perform full router configuration tasks

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

G

Match each item with a statement below. -Used for verification,takes a variable-length input and converts it to a fixed-length output string

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

E

Match each item with a statement below. -IDS systems that don't take any action to stop or prevent an activity

(Multiple Choice)
4.7/5
(25)

To examine the router's routing table,a Cisco administrator would enter which command?

(Multiple Choice)
4.9/5
(32)

What type of packet filtering records session-specific information about a network connection,including the ports a client uses?

(Multiple Choice)
4.7/5
(36)

What is a path-vector routing protocol?

(Essay)
4.9/5
(39)

Routers operate at the Network layer of the TCP/IP protocol stack.

(True/False)
4.7/5
(30)

When Web site visitors are involved in downloading malicious code without their knowledge,they may be unknowingly involved in what type of process?

(Multiple Choice)
4.7/5
(35)

A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment,risk remediation,and legal consultation?

(Multiple Choice)
4.8/5
(31)

Match each item with a statement below. -Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm

(Multiple Choice)
4.9/5
(37)

What is Triple Data Encryption Standard (3DES)?

(Essay)
4.9/5
(34)

What is a distance-vector routing protocol?

(Essay)
5.0/5
(38)

What type of function is being performed when a router screens packets based on information in the packet header?

(Multiple Choice)
4.9/5
(31)

What type of IDS/IPS is used to protect a critical network server or database server by installing the IDS or IPS software on the system you're attempting to protect?

(Multiple Choice)
4.9/5
(37)

What type of an IDS is being used when it does not take any action to stop or prevent an activity occurring?

(Multiple Choice)
4.8/5
(38)

What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting,aggregating,and correlating log and alert data from routers,firewalls,IDS/IPS,endpoint logs,Web filtering devices,and other security tools?

(Multiple Choice)
4.8/5
(36)

How does public key infrastructure work?

(Essay)
4.7/5
(40)

Match each item with a statement below. -Uses a single key to encrypt and decrypt data

(Multiple Choice)
4.7/5
(39)

What are the advantages and disadvantages of hardware and software firewalls?

(Essay)
4.8/5
(38)
Showing 1 - 20 of 59
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)