Exam 11: Securing Your Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________________________ packet filtering tracks information about a communication session such as which ports are in use.

(Short Answer)
4.9/5
(44)

Which of the following could be an exploit that occurs at the Network layer? (Choose all that apply.)

(Multiple Choice)
4.9/5
(47)

____ can translate an IP address from a private network to a different address used on a public network or the Internet.

(Multiple Choice)
4.9/5
(44)

_________________________ is the part of IPSec that encrypts data.

(Short Answer)
4.7/5
(33)

Which of the following occurs when the attacker is able to intercept or monitor transmissions meant for a different computer?

(Multiple Choice)
4.9/5
(36)

Match each term with the correct statement below. -a list of permit and deny conditions that can be associated with a particular router interface.

(Multiple Choice)
4.8/5
(46)

Match each term with the correct statement below. -a program that endlessly replicates on the same computer,or that sends itself to many other computers on a network.

(Multiple Choice)
4.8/5
(41)

Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer,such as a Web server.

(Multiple Choice)
4.8/5
(33)

What is spoofing and how can it be used to attack a computer or network?

(Essay)
4.8/5
(39)
Showing 41 - 49 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)