Exam 6: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Layer 3 of the OSI model is the ____ layer.

(Multiple Choice)
4.9/5
(36)

A(n) ____ is the end of the tunnel between VPN devices.

(Multiple Choice)
4.7/5
(39)

____________________ work occasionally or regularly from a home office.

(Short Answer)
4.9/5
(28)

Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.

(True/False)
4.7/5
(34)

____ keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.

(Multiple Choice)
4.9/5
(27)
Match each term with the correct statement below.
Each packet is given the same IP address but a different TCP port number.
DMZ
Segmenting a network by separating devices into logical groups
Remote access
A software-based application that runs on a local host computer that can detect an attack as it occurs
OSI model
Correct Answer:
Verified
Premises:
Responses:
Each packet is given the same IP address but a different TCP port number.
DMZ
Segmenting a network by separating devices into logical groups
Remote access
A software-based application that runs on a local host computer that can detect an attack as it occurs
OSI model
Refers to any combination of hardware and software that enables remote users to access a local internal network
VLAN
Allows an IP address to be split anywhere within its 32 bits
NAT
Used to classify standard network devices based on their function
HIDS
Each outgoing packet is given a different IP address
Subnet addressing
A reference set of data against which operational data is compared
PAT
(Matching)
4.8/5
(39)

Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring

(Multiple Choice)
4.9/5
(37)

The key to the OSI reference model is ____________________.

(Short Answer)
4.8/5
(34)

____ is typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).

(Multiple Choice)
4.7/5
(34)

List and describe three features of Internet content filters.

(Essay)
4.7/5
(38)

Describe how NAC works.

(Essay)
4.8/5
(41)

Networks are usually segmented by using ____________________ to divide the network into a hierarchy.

(Short Answer)
4.8/5
(34)

Discuss the two advantages that NAT provides.

(Essay)
4.8/5
(34)

____ switches are connected directly to the devices on a network.

(Multiple Choice)
4.9/5
(38)

Describe how VLAN communication takes place.

(Essay)
4.8/5
(38)

NAT replaces a private IP address with a(n) ____________________ IP address.

(Short Answer)
4.8/5
(31)

A(n) ____ encrypts all data that is transmitted between the remote device and the network.

(Multiple Choice)
4.8/5
(20)

Describe the difference between subnetting and VLANs.

(Essay)
4.8/5
(43)

Describe the difference between an active NIDS and a passive NIDS.

(Essay)
5.0/5
(37)

In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____.

(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)