Deck 6: Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 6: Network Security
1
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
True
2
A basic level of security can be achieved through using the security features found in network hardware.
True
3
A(n) ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
A) application gateway
B) security proxy
C) Web security gateway
D) firewall
A) application gateway
B) security proxy
C) Web security gateway
D) firewall
C
4
A ____ is a network device that can forward packets across computer networks.
A) switch
B) router
C) bridge
D) firewall
A) switch
B) router
C) bridge
D) firewall
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Each operation in a computing environment starts with a ____.
A) system call
B) unit call
C) hardware instruction
D) system exception
A) system call
B) unit call
C) hardware instruction
D) system exception
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
A) Stateful frame filtering
B) Stateless frame filtering
C) Stateful packet filtering
D) Stateless packet filtering
A) Stateful frame filtering
B) Stateless frame filtering
C) Stateful packet filtering
D) Stateless packet filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The OSI model breaks networking steps down into a series of six layers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ IP addresses are IP addresses that are not assigned to any specific user or organization.
A) Public
B) Private
C) Public domain
D) Private domain
A) Public
B) Private
C) Public domain
D) Private domain
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
A ____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.
A) switch
B) router
C) firewall
D) hub
A) switch
B) router
C) firewall
D) hub
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ is a technique that allows private IP addresses to be used on the public Internet.
A) PAT
B) PNAT
C) NAPT
D) NAT
A) PAT
B) PNAT
C) NAPT
D) NAT
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring
A) application
B) protocol
C) packet
D) signature
A) application
B) protocol
C) packet
D) signature
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) ____ is the end of the tunnel between VPN devices.
A) endpoint
B) client
C) server
D) proxy
A) endpoint
B) client
C) server
D) proxy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A(n) ____ does not serve clients, but instead routes incoming requests to the correct server.
A) forward proxy
B) application proxy
C) system proxy
D) reverse proxy
A) forward proxy
B) application proxy
C) system proxy
D) reverse proxy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ is a technology that can help to evenly distribute work across a network.
A) Stateful packet filtering
B) Load balancing
C) DNS caching
D) DNS poisoning
A) Stateful packet filtering
B) Load balancing
C) DNS caching
D) DNS poisoning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Layer 3 of the OSI model is the ____ layer.
A) Network
B) Data Link
C) Session
D) Presentation
A) Network
B) Data Link
C) Session
D) Presentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ____ encrypts all data that is transmitted between the remote device and the network.
A) IKE tunnel
B) VPN
C) endpoint
D) router
A) IKE tunnel
B) VPN
C) endpoint
D) router
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Workgroup switches must work faster than core switches.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.
A) proxy server
B) DNS server
C) VPN server
D) telnet server
A) proxy server
B) DNS server
C) VPN server
D) telnet server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Layer 5 of the OSI model is the ____ layer.
A) Network
B) Data Link
C) Session
D) Presentation
A) Network
B) Data Link
C) Session
D) Presentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
IP addresses are ____-bit addresses.
A) 4
B) 8
C) 16
D) 32
A) 4
B) 8
C) 16
D) 32
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Discuss the two advantages that NAT provides.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Describe all-in-one network security appliances.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What are the two TCP/IP protocols used by e-mail systems to send and receive messages?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ is typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
A) PAT
B) NAT
C) PAN
D) PNAT
A) PAT
B) NAT
C) PAN
D) PNAT
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
List and describe three features of Internet content filters.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
The key to the OSI reference model is ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
NAT replaces a private IP address with a(n) ____________________ IP address.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____.
A) bastion
B) choke
C) DMZ
D) reduction point
A) bastion
B) choke
C) DMZ
D) reduction point
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ allows scattered users to be logically grouped together even though they may be attached to different switches.
A) subnet
B) broadcast domain
C) DMZ
D) VLAN
A) subnet
B) broadcast domain
C) DMZ
D) VLAN
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Networks are usually segmented by using ____________________ to divide the network into a hierarchy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Describe the difference between an active NIDS and a passive NIDS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Describe how NAC works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
List and describe two advantages of a proxy server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ work occasionally or regularly from a home office.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
List and describe three advantages to subnetting.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ switches are connected directly to the devices on a network.
A) Workgroup
B) Distribution
C) Core
D) Intermediate
A) Workgroup
B) Distribution
C) Core
D) Intermediate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
____ provides remote users with the same access and functionality as local users through a VPN or dial-up connection.
A) Extranet
B) Remote access
C) Intranet
D) Virtual access
A) Extranet
B) Remote access
C) Intranet
D) Virtual access
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe the difference between subnetting and VLANs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe how VLAN communication takes place.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck