C Danvers
Quiz von , erstellt am more than 1 year ago

Ch 6 quiz

914
0
0
C Danvers
Erstellt von C Danvers vor mehr als 6 Jahre
Schließen

Ch 6 - Network Security Devices, Design, and Technology

Frage 1 von 40

1

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?

Wähle eine der folgenden:

  • Stateful frame filtering

  • Stateless frame filtering

  • Stateful packet filtering

  • Stateless packet filtering

Erklärung

Frage 2 von 40

1

All modern operating systems include a hardware firewall, usually called a host-based firewall.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 3 von 40

1

An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?

Wähle eine der folgenden:

  • stateful packet filtering

  • load balancing

  • failover servers

  • proxy servers

Erklärung

Frage 4 von 40

1

An agent may be a permanent NAC agent and reside on end devices until uninstalled, but it cannot be a dissolvable NAC agent.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 5 von 40

1

An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?

Wähle eine der folgenden:

  • switch

  • router

  • firewall

  • hub

Erklärung

Frage 6 von 40

1

An intranet is a separate open network that anyone can access without prior authorization.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 7 von 40

1

Anomaly monitoring is designed for detecting statistical anomalies.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 8 von 40

1

A security advantage of VLANs is that they can be used to prevent direct communication between servers.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 9 von 40

1

A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?

Wähle eine der folgenden:

  • Install a VPN, configure host

  • Set up a proxy in front of the web server

  • Create a DMZ, add necessary hosts

  • Configure a reduction point on a firewall

Erklärung

Frage 10 von 40

1

Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 11 von 40

1

If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?

Wähle eine der folgenden:

  • physical network segregation

  • complete network segregation

  • network isolation

  • logical network segregation

Erklärung

Frage 12 von 40

1

NAT is not a specific device, technology, or protocol. It is a technique for substituting IP addresses.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 13 von 40

1

One use of data loss prevention (DLP) is blocking the copying of files to a USB flash drive.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 14 von 40

1

Select the technology that can be used to examine content through application-level filtering.

Wähle eine der folgenden:

  • Application gateway

  • Security proxy

  • Web security gateway

  • Firewall

Erklärung

Frage 15 von 40

1

The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches. How can this be done?

Wähle eine der folgenden:

  • Create a subnet for each network switch in use

  • Create additional subnets for the separate groups

  • Add all users to a single network segment

  • Create a VLAN and add the users' computers/ports to the correct VLAN

Erklärung

Frage 16 von 40

1

The OSI model breaks networking steps down into a series of six layers.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 17 von 40

1

What data unit is associated with the Open Systems Interconnection layer four?

Wähle eine der folgenden:

  • segment

  • packet

  • frame

  • bit

Erklärung

Frage 18 von 40

1

What data unit is associated with the Open Systems Interconnection layer two?

Wähle eine der folgenden:

  • segment

  • packet

  • frame

  • bit

Erklärung

Frage 19 von 40

1

What dedicated hardware device aggregates hundreds or thousands of VPN connections?

Wähle eine der folgenden:

  • VPN server

  • VPN gateway

  • VPN switch

  • VPN concentrator

Erklärung

Frage 20 von 40

1

What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?

Wähle eine der folgenden:

  • forward proxy server

  • DNS server

  • VPN server

  • telnet server

Erklärung

Frage 21 von 40

1

What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?

Wähle eine der folgenden:

  • system call

  • unit call

  • hardware instruction

  • system exception

Erklärung

Frage 22 von 40

1

What kind of networking device forwards packets across different computer networks by reading destination addresses?

Wähle eine der folgenden:

  • switch

  • router

  • bridge

  • firewall

Erklärung

Frage 23 von 40

1

What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS processing?

Wähle eine der folgenden:

  • SSL/TLS accelerator

  • media gateway

  • SSL decryptor

  • security module

Erklärung

Frage 24 von 40

1

What technology enables authorized users to use an unsecured public network, such as the Internet as if it were a secure private network?

Wähle eine der folgenden:

  • IKE tunnel

  • VPN

  • endpoint

  • router

Erklärung

Frage 25 von 40

1

What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network?

Wähle eine der folgenden:

  • network access control

  • virtual LANs

  • network address translation

  • host health checks

Erklärung

Frage 26 von 40

1

What term is used to describe the software agents that are used by NAC and installed on devices to gather information?

Wähle eine der folgenden:

  • NAC check agents

  • server health agents

  • host agent health checks

  • network health agents

Erklärung

Frage 27 von 40

1

What type of dedicated cryptographic processor that provides protection for cryptographic keys?

Wähle eine der folgenden:

  • SSL/TLS accelerator

  • media gateway

  • SSL decryptor

  • hardware security module

Erklärung

Frage 28 von 40

1

What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?

Wähle eine der folgenden:

  • application-based

  • protocol-based

  • behavioral-based

  • signature-based

Erklärung

Frage 29 von 40

1

What type of network access control uses Active Directory to scan a device to verify that it is in compliance?

Wähle eine der folgenden:

  • agentless NAC

  • dissolvable NAC

  • dependent NAC

  • permanent NAC

Erklärung

Frage 30 von 40

1

What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?

Wähle eine der folgenden:

  • extranet

  • intranet

  • enterprise network

  • guest network

Erklärung

Frage 31 von 40

1

What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?

Wähle eine der folgenden:

  • extranet

  • intranet

  • enterprise network

  • guest network

Erklärung

Frage 32 von 40

1

What vendor neutral protocol implements support for VLAN tagging?

Wähle eine der folgenden:

  • ISL

  • VTP

  • 802.1Q

  • VSTP

Erklärung

Frage 33 von 40

1

When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?

Wähle eine der folgenden:

  • PAT

  • PNAT

  • NAPT

  • NAT

Erklärung

Frage 34 von 40

1

When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, what technology is being used?

Wähle eine der folgenden:

  • priority tunnel

  • split tunneling

  • full tunnel

  • shared tunneling

Erklärung

Frage 35 von 40

1

Which network address below is not a private IP address network?

Wähle eine der folgenden:

  • 10.4.5.0

  • 172.63.255.0

  • 192.168.255.0

  • 172.17.16.0

Erklärung

Frage 36 von 40

1

Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?

Wähle eine der folgenden:

  • forward proxy

  • application proxy

  • system proxy

  • reverse proxy

Erklärung

Frage 37 von 40

1

Which of the following is a software-based application that runs on a local host computer that can detect an attack as it occurs?

Wähle eine der folgenden:

  • local-based intrusion detection system

  • host-based intrusion detection system

  • host-based application protection

  • local-based application protection

Erklärung

Frage 38 von 40

1

Which of the following is a system of security tools that are used to recognize and identify data that is critical to the organization and ensure that it is protected?

Wähle eine der folgenden:

  • USB blocking

  • content inspection

  • storage sensors

  • data loss prevention

Erklärung

Frage 39 von 40

1

Which of the following is defined as a security analysis of the transaction within its approved context?

Wähle eine der folgenden:

  • USB blocking

  • content inspection

  • storage sensors

  • data loss prevention

Erklärung

Frage 40 von 40

1

Workgroup switches must work faster than core switches.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung