Exam 13: Network Protection Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A security appliance is a single device combining two or more network protection functions.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

____ monitor network devices so that security administrators can identify attacks in progress and stop them.

Free
(Multiple Choice)
4.8/5
(20)
Correct Answer:
Verified

D

A honeypot appears to have important data or sensitive information stored on it.

Free
(True/False)
5.0/5
(28)
Correct Answer:
Verified

True

To see the contents of flash memory and the amount of memory used and available, a Cisco administrator would type this command: ____.

(Multiple Choice)
4.8/5
(41)

How do you know what mode a Cisco router is in?

(Essay)
4.9/5
(36)

MATCHING Match each term with the correct statement below. -internal private IP addresses are mapped to public external IP addresses

(Multiple Choice)
4.8/5
(29)

What are the interfaces in a Cisco router?

(Essay)
4.9/5
(26)

A standard IP access list is restricted to source IP addresses.

(True/False)
4.8/5
(35)

MATCHING Match each term with the correct statement below. -handles each packet on an individual basis and are not resistant to spoofing or DoS attacks

(Multiple Choice)
4.7/5
(31)

The ____ of a Cisco router holds the IOS the router is using.

(Multiple Choice)
4.8/5
(35)

MATCHING Match each term with the correct statement below. -serves two purposes: controlling access to all traffic that enters an internal network, and controlling all traffic that leaves an internal network

(Multiple Choice)
4.9/5
(30)

What is a distance-vector routing protocol?

(Essay)
4.8/5
(36)

One goal of a(n) ____ is to have hackers connect to the "phony" computer long enough to be traced.

(Multiple Choice)
4.9/5
(40)

A(n) ____________________ is a computer placed on the perimeter of a network that contains information or data intended to lure and then trap hackers.

(Short Answer)
4.8/5
(33)

What is honeyd? How does it work?

(Essay)
4.7/5
(32)

MATCHING Match each term with the correct statement below. -replaced the Cisco PIX firewall and added advanced modular features

(Multiple Choice)
4.9/5
(39)

A(n) ____ sits between the Internet and the internal network and is sometimes referred to as a "perimeter network."

(Multiple Choice)
4.8/5
(35)

Stateless packet filters recognize types of anomalies that most routers ignore, such as hundreds or thousands of SYN/ACK packets being sent to a computer or server, even though the computer or server hasn't sent out any SYN packets

(True/False)
4.8/5
(31)

____________________ honeypots are created by using a programming language rather than configuring a physical device.

(Short Answer)
4.8/5
(32)

____, written in C for *nix platforms, is an open-source virtual honeypot created and maintained by Niels Provos.

(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)