Exam 7: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________________ is a technique that allows a private IP addresses to be used on the Internet with a single public IP address.

(Short Answer)
4.7/5
(32)

Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.

(True/False)
4.8/5
(26)

List and describe three advantages to subnetting.

(Essay)
4.9/5
(34)

Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.

(True/False)
4.9/5
(40)

When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?

(Multiple Choice)
4.7/5
(30)

Matching -A device that connects network segments and forwards onlyl frames intended for that specific device or frames sent to all devices​

(Multiple Choice)
4.8/5
(34)

What is the name for an instruction that interrupts a program being executed and requests a service from the operating system?

(Multiple Choice)
4.9/5
(27)

Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files. ​Match the following terms to the appropriate definitions.​

(Short Answer)
4.9/5
(34)

Defense in depth, or layered security, involves the use of multiple types of network hardware within a network.​

(True/False)
4.8/5
(36)

Matching -​A device that aggregates VPN connections

(Multiple Choice)
4.9/5
(36)

A network _________________ isolates connected devices by learning MAC addresses and only sending frames intended for specific MAC addresses to the ports they're connected to, unless the MAC address is unknown.

(Short Answer)
4.9/5
(42)

A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?

(Multiple Choice)
4.8/5
(33)

An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured to make use of both servers in a manner that is transparent to the end users?

(Multiple Choice)
4.8/5
(39)

What kind of networking device forwards packets across different computer networks by reading destination addresses?

(Multiple Choice)
4.9/5
(35)

Matching -A technology that allows scattered users to be logically grouped together even though they may be attached to different switches​

(Multiple Choice)
4.8/5
(41)

Matching -​A device that can forward packets across computer networks

(Multiple Choice)
4.8/5
(40)

What technology enables authorized users to use an unsecured public network, such as the Internet, as if were a secure private network?

(Multiple Choice)
4.8/5
(33)

A load balancer that works with the File Transfer Protocol is operating at what layer of the OSI model?

(Multiple Choice)
4.8/5
(45)

Which network address below is not a private IP address network?

(Multiple Choice)
4.7/5
(33)

The management in your corporate office want to group users on the network together logically even though they are attached to separate network switches. How can this be done?

(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)