Exam 7: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Matching -A monitoring technique used by an intrusion detection system (IDS) that uses an algorithm to determine if a threat exists​

(Multiple Choice)
4.8/5
(33)

Discuss the two advantages that NAT provides.

(Essay)
4.8/5
(44)

A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:

(Multiple Choice)
4.9/5
(30)

Describe how VLAN communication takes place.

(Essay)
4.8/5
(31)

What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?

(Multiple Choice)
4.9/5
(43)

What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?

(Essay)
4.8/5
(45)

Matching -​Searching for malware in incoming web content

(Multiple Choice)
4.8/5
(30)

What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?

(Multiple Choice)
4.8/5
(35)

Describe the difference between subnetting and VLANs.

(Essay)
4.8/5
(33)

Select below the technology that can be used to examine content through application-level filtering:

(Multiple Choice)
4.7/5
(26)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)