Ch 6 - Network Security Devices, Design, and Technology

Beschreibung

Ch 6 quiz
C Danvers
Quiz von C Danvers, aktualisiert more than 1 year ago
C Danvers
Erstellt von C Danvers vor etwa 6 Jahre
905
0

Zusammenfassung der Ressource

Frage 1

Frage
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?
Antworten
  • Stateful frame filtering
  • Stateless frame filtering
  • Stateful packet filtering
  • Stateless packet filtering

Frage 2

Frage
All modern operating systems include a hardware firewall, usually called a host-based firewall.
Antworten
  • True
  • False

Frage 3

Frage
An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?
Antworten
  • stateful packet filtering
  • load balancing
  • failover servers
  • proxy servers

Frage 4

Frage
An agent may be a permanent NAC agent and reside on end devices until uninstalled, but it cannot be a dissolvable NAC agent.
Antworten
  • True
  • False

Frage 5

Frage
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?
Antworten
  • switch
  • router
  • firewall
  • hub

Frage 6

Frage
An intranet is a separate open network that anyone can access without prior authorization.
Antworten
  • True
  • False

Frage 7

Frage
Anomaly monitoring is designed for detecting statistical anomalies.
Antworten
  • True
  • False

Frage 8

Frage
A security advantage of VLANs is that they can be used to prevent direct communication between servers.
Antworten
  • True
  • False

Frage 9

Frage
A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?
Antworten
  • Install a VPN, configure host
  • Set up a proxy in front of the web server
  • Create a DMZ, add necessary hosts
  • Configure a reduction point on a firewall

Frage 10

Frage
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
Antworten
  • True
  • False

Frage 11

Frage
If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?
Antworten
  • physical network segregation
  • complete network segregation
  • network isolation
  • logical network segregation

Frage 12

Frage
NAT is not a specific device, technology, or protocol. It is a technique for substituting IP addresses.
Antworten
  • True
  • False

Frage 13

Frage
One use of data loss prevention (DLP) is blocking the copying of files to a USB flash drive.
Antworten
  • True
  • False

Frage 14

Frage
Select the technology that can be used to examine content through application-level filtering.
Antworten
  • Application gateway
  • Security proxy
  • Web security gateway
  • Firewall

Frage 15

Frage
The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches. How can this be done?
Antworten
  • Create a subnet for each network switch in use
  • Create additional subnets for the separate groups
  • Add all users to a single network segment
  • Create a VLAN and add the users' computers/ports to the correct VLAN

Frage 16

Frage
The OSI model breaks networking steps down into a series of six layers.
Antworten
  • True
  • False

Frage 17

Frage
What data unit is associated with the Open Systems Interconnection layer four?
Antworten
  • segment
  • packet
  • frame
  • bit

Frage 18

Frage
What data unit is associated with the Open Systems Interconnection layer two?
Antworten
  • segment
  • packet
  • frame
  • bit

Frage 19

Frage
What dedicated hardware device aggregates hundreds or thousands of VPN connections?
Antworten
  • VPN server
  • VPN gateway
  • VPN switch
  • VPN concentrator

Frage 20

Frage
What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
Antworten
  • forward proxy server
  • DNS server
  • VPN server
  • telnet server

Frage 21

Frage
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?
Antworten
  • system call
  • unit call
  • hardware instruction
  • system exception

Frage 22

Frage
What kind of networking device forwards packets across different computer networks by reading destination addresses?
Antworten
  • switch
  • router
  • bridge
  • firewall

Frage 23

Frage
What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS processing?
Antworten
  • SSL/TLS accelerator
  • media gateway
  • SSL decryptor
  • security module

Frage 24

Frage
What technology enables authorized users to use an unsecured public network, such as the Internet as if it were a secure private network?
Antworten
  • IKE tunnel
  • VPN
  • endpoint
  • router

Frage 25

Frage
What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network?
Antworten
  • network access control
  • virtual LANs
  • network address translation
  • host health checks

Frage 26

Frage
What term is used to describe the software agents that are used by NAC and installed on devices to gather information?
Antworten
  • NAC check agents
  • server health agents
  • host agent health checks
  • network health agents

Frage 27

Frage
What type of dedicated cryptographic processor that provides protection for cryptographic keys?
Antworten
  • SSL/TLS accelerator
  • media gateway
  • SSL decryptor
  • hardware security module

Frage 28

Frage
What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
Antworten
  • application-based
  • protocol-based
  • behavioral-based
  • signature-based

Frage 29

Frage
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
Antworten
  • agentless NAC
  • dissolvable NAC
  • dependent NAC
  • permanent NAC

Frage 30

Frage
What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?
Antworten
  • extranet
  • intranet
  • enterprise network
  • guest network

Frage 31

Frage
What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?
Antworten
  • extranet
  • intranet
  • enterprise network
  • guest network

Frage 32

Frage
What vendor neutral protocol implements support for VLAN tagging?
Antworten
  • ISL
  • VTP
  • 802.1Q
  • VSTP

Frage 33

Frage
When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?
Antworten
  • PAT
  • PNAT
  • NAPT
  • NAT

Frage 34

Frage
When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, what technology is being used?
Antworten
  • priority tunnel
  • split tunneling
  • full tunnel
  • shared tunneling

Frage 35

Frage
Which network address below is not a private IP address network?
Antworten
  • 10.4.5.0
  • 172.63.255.0
  • 192.168.255.0
  • 172.17.16.0

Frage 36

Frage
Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?
Antworten
  • forward proxy
  • application proxy
  • system proxy
  • reverse proxy

Frage 37

Frage
Which of the following is a software-based application that runs on a local host computer that can detect an attack as it occurs?
Antworten
  • local-based intrusion detection system
  • host-based intrusion detection system
  • host-based application protection
  • local-based application protection

Frage 38

Frage
Which of the following is a system of security tools that are used to recognize and identify data that is critical to the organization and ensure that it is protected?
Antworten
  • USB blocking
  • content inspection
  • storage sensors
  • data loss prevention

Frage 39

Frage
Which of the following is defined as a security analysis of the transaction within its approved context?
Antworten
  • USB blocking
  • content inspection
  • storage sensors
  • data loss prevention

Frage 40

Frage
Workgroup switches must work faster than core switches.
Antworten
  • True
  • False
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002