Exam 6: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ IP addresses are IP addresses that are not assigned to any specific user or organization.

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

____ provides remote users with the same access and functionality as local users through a VPN or dial-up connection.

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

B

A ____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

Describe all-in-one network security appliances.

(Essay)
4.7/5
(40)

Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.

(Short Answer)
4.8/5
(39)

What are the two TCP/IP protocols used by e-mail systems to send and receive messages?

(Essay)
4.8/5
(31)

A(n) ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.

(Multiple Choice)
4.7/5
(39)

____ is a technique that allows private IP addresses to be used on the public Internet.

(Multiple Choice)
4.9/5
(37)

Each operation in a computing environment starts with a ____.

(Multiple Choice)
4.9/5
(38)

____ is a technology that can help to evenly distribute work across a network.

(Multiple Choice)
4.9/5
(41)

Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.

(True/False)
5.0/5
(30)

Layer 5 of the OSI model is the ____ layer.

(Multiple Choice)
4.9/5
(29)

List and describe three advantages to subnetting.

(Essay)
4.8/5
(27)

A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.

(Multiple Choice)
4.8/5
(36)

List and describe two advantages of a proxy server.

(Essay)
4.8/5
(41)

A ____ allows scattered users to be logically grouped together even though they may be attached to different switches.

(Multiple Choice)
4.7/5
(40)

Workgroup switches must work faster than core switches.

(True/False)
4.8/5
(34)

A basic level of security can be achieved through using the security features found in network hardware.

(True/False)
4.9/5
(31)

IP addresses are ____-bit addresses.

(Multiple Choice)
4.7/5
(41)

The OSI model breaks networking steps down into a series of six layers.

(True/False)
4.8/5
(34)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)