865 538
Quiz by , created more than 1 year ago

network security

27
0
0
865 538
Created by 865 538 about 7 years ago
Close

nsf_06(7)

Question 1 of 15

1

A(n) ____ encrypts all data that is transmitted between the remote device and the network.

Select one of the following:

  • a. router

  • b. endpoint

  • c. VPN

  • d. IKE tunnel

Explanation

Question 2 of 15

1

A(n) ____ is the end of the tunnel between VPN devices.

Select one of the following:

  • a. endpoint

  • b. server

  • c. client

  • d. proxy

Explanation

Question 3 of 15

1

Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring

Select one of the following:

  • a. signature

  • b. packet

  • c. application

  • d. protocol

Explanation

Question 4 of 15

1

IP addresses are ____-bit addresses.

Select one of the following:

  • a. 8

  • b. 32

  • c. 16

  • d. 4

Explanation

Question 5 of 15

1

Layer 3 of the OSI model is the ____ layer.

Select one of the following:

  • a. Network

  • b. Presentation

  • c. Session

  • d. Data Link

Explanation

Question 6 of 15

1

____ IP addresses are IP addresses that are not assigned to any specific user or organization.

Select one of the following:

  • a. Public

  • b. Private domain

  • c. Private

  • d. Public domain

Explanation

Question 7 of 15

1

____ is a technique that allows private IP addresses to be used on the public Internet.

Select one of the following:

  • a. NAT

  • b. PNAT

  • c. PAT

  • d. NAPT

Explanation

Question 8 of 15

1

____ is a technology that can help to evenly distribute work across a network.

Select one of the following:

  • a. Load balancing

  • b. DNS caching

  • c. DNS poisoning

  • d. Stateful packet filtering

Explanation

Question 9 of 15

1

____ switches are connected directly to the devices on a network.

Select one of the following:

  • a. Distribution

  • b. Workgroup

  • c. Core

  • d. Intermediate

Explanation

Question 10 of 15

1

Fill the blank space to complete the text.

NAT replaces a private IP address with a(n) IP address.

Explanation

Question 11 of 15

1

Fill the blank space to complete the text.

The key to the OSI reference model is .

Explanation

Question 12 of 15

1

Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.

Select one of the following:

  • True
  • False

Explanation

Question 13 of 15

1

Workgroup switches must work faster than core switches.

Select one of the following:

  • True
  • False

Explanation

Question 14 of 15

1

A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.

Select one of the following:

  • a. VPN server

  • b. proxy server

  • c. telnet server

  • d. DNS server

Explanation

Question 15 of 15

1

A ____ is a network device that can forward packets across computer networks.

Select one of the following:

  • a. bridge

  • b. switch

  • c. router

  • d. firewall

Explanation