nsf_06(7)

Description

network security
865 538
Quiz by 865 538, updated more than 1 year ago
865 538
Created by 865 538 almost 8 years ago
29
0

Resource summary

Question 1

Question
A(n) ____ encrypts all data that is transmitted between the remote device and the network.
Answer
  • a. router
  • b. endpoint
  • c. VPN
  • d. IKE tunnel

Question 2

Question
A(n) ____ is the end of the tunnel between VPN devices.
Answer
  • a. endpoint
  • b. server
  • c. client
  • d. proxy

Question 3

Question
Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring
Answer
  • a. signature
  • b. packet
  • c. application
  • d. protocol

Question 4

Question
IP addresses are ____-bit addresses.
Answer
  • a. 8
  • b. 32
  • c. 16
  • d. 4

Question 5

Question
Layer 3 of the OSI model is the ____ layer.
Answer
  • a. Network
  • b. Presentation
  • c. Session
  • d. Data Link

Question 6

Question
____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Answer
  • a. Public
  • b. Private domain
  • c. Private
  • d. Public domain

Question 7

Question
____ is a technique that allows private IP addresses to be used on the public Internet.
Answer
  • a. NAT
  • b. PNAT
  • c. PAT
  • d. NAPT

Question 8

Question
____ is a technology that can help to evenly distribute work across a network.
Answer
  • a. Load balancing
  • b. DNS caching
  • c. DNS poisoning
  • d. Stateful packet filtering

Question 9

Question
____ switches are connected directly to the devices on a network.
Answer
  • a. Distribution
  • b. Workgroup
  • c. Core
  • d. Intermediate

Question 10

Question
NAT replaces a private IP address with a(n) [blank_start]public[blank_end] IP address.
Answer
  • public

Question 11

Question
The key to the OSI reference model is [blank_start]layers[blank_end].
Answer
  • layers

Question 12

Question
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
Answer
  • True
  • False

Question 13

Question
Workgroup switches must work faster than core switches.
Answer
  • True
  • False

Question 14

Question
A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.
Answer
  • a. VPN server
  • b. proxy server
  • c. telnet server
  • d. DNS server

Question 15

Question
A ____ is a network device that can forward packets across computer networks.
Answer
  • a. bridge
  • b. switch
  • c. router
  • d. firewall
Show full summary Hide full summary

Similar

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_02
865 538
nsf_09(11)
865 538
nsf_04(15)
865 538
nsf_05(4)
865 538
nsf_01
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
med chem 2
lola_smily