Exam 6: Network Security Devices, Design, and Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is defined as a security analysis of the transaction within its approved context?

(Multiple Choice)
4.9/5
(35)

A security advantage of VLANs is that they can be used to prevent direct communication between servers.

(True/False)
4.8/5
(40)

Select the technology that can be used to examine content through application-level filtering.

(Multiple Choice)
4.8/5
(33)

NAT is not a specific device,technology,or protocol.It is a technique for substituting IP addresses.

(True/False)
4.8/5
(34)

What type of monitoring compares network traffic,activities,transactions,or behavior against a database of known attack patterns?

(Multiple Choice)
4.9/5
(33)

A web server must be accessible to untrusted outside users.What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?

(Multiple Choice)
4.8/5
(37)

What data unit is associated with the Open Systems Interconnection layer two?

(Multiple Choice)
4.8/5
(40)

Describe how Internet content filters are used.

(Essay)
4.8/5
(35)

The OSI model breaks networking steps down into a series of six layers.

(True/False)
4.7/5
(36)

When a private network uses a single public IP address,and each outgoing TCP packet uses a different port to allow for proper translation,what networking technology is in use?

(Multiple Choice)
4.9/5
(33)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)