Exam 7: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Matching -A techniq​ue that allows private IP addresses to be used on the public Internet.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

F

The OSI model breaks networking steps down into a series of six layers.

Free
(True/False)
4.9/5
(40)
Correct Answer:
Verified

False

The traffic sent by devices connected to a hub can be captured and decoded by a _________________.

Free
(Short Answer)
4.9/5
(40)
Correct Answer:
Verified

Protocol analyzer​

The standard TCP/IP protocol uses IP addresses which are how many bytes in length?

(Multiple Choice)
4.8/5
(40)

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?

(Multiple Choice)
4.9/5
(36)

Matching -​A firewall that can identify the applications that send packets through the firewall and then make decisions about the applications

(Multiple Choice)
4.9/5
(29)

What layer of the OSI model is responsible for permitting two parties on a network to hold ongoing communications across the network?

(Multiple Choice)
4.7/5
(34)

​Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?

(Multiple Choice)
4.7/5
(33)

Workgroup switches must work faster than core switches.

(True/False)
4.8/5
(36)

​What is the difference between anomaly based monitoring and signature based monitoring?

(Essay)
4.9/5
(35)

Describe how NAC works.

(Essay)
4.8/5
(23)

List and describe two advantages of a proxy server.

(Essay)
4.8/5
(34)

Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed.

(Multiple Choice)
4.7/5
(37)

What vendor neutral protocol implements support for VLAN tagging?

(Multiple Choice)
4.9/5
(33)

Matching -An intrusion prevention system that knows information such as the applications that are running as well as the underlying operating systems​

(Multiple Choice)
4.7/5
(38)

List and describe three features of Internet content filters.

(Essay)
5.0/5
(41)

How does a Unified Threat Management (UTM) security product help reduce administrative overhead?​

(Essay)
4.7/5
(37)

Matching -Searching incoming web content to match keywords​

(Multiple Choice)
4.9/5
(34)

An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?

(Multiple Choice)
4.8/5
(32)

A ______________ is a worker who work occasionally or regularly from a home office.

(Short Answer)
4.9/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)