nsf_06(7)

Descripción

network security
865 538
Test por 865 538, actualizado hace más de 1 año
865 538
Creado por 865 538 hace casi 8 años
29
0

Resumen del Recurso

Pregunta 1

Pregunta
A(n) ____ encrypts all data that is transmitted between the remote device and the network.
Respuesta
  • a. router
  • b. endpoint
  • c. VPN
  • d. IKE tunnel

Pregunta 2

Pregunta
A(n) ____ is the end of the tunnel between VPN devices.
Respuesta
  • a. endpoint
  • b. server
  • c. client
  • d. proxy

Pregunta 3

Pregunta
Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring
Respuesta
  • a. signature
  • b. packet
  • c. application
  • d. protocol

Pregunta 4

Pregunta
IP addresses are ____-bit addresses.
Respuesta
  • a. 8
  • b. 32
  • c. 16
  • d. 4

Pregunta 5

Pregunta
Layer 3 of the OSI model is the ____ layer.
Respuesta
  • a. Network
  • b. Presentation
  • c. Session
  • d. Data Link

Pregunta 6

Pregunta
____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Respuesta
  • a. Public
  • b. Private domain
  • c. Private
  • d. Public domain

Pregunta 7

Pregunta
____ is a technique that allows private IP addresses to be used on the public Internet.
Respuesta
  • a. NAT
  • b. PNAT
  • c. PAT
  • d. NAPT

Pregunta 8

Pregunta
____ is a technology that can help to evenly distribute work across a network.
Respuesta
  • a. Load balancing
  • b. DNS caching
  • c. DNS poisoning
  • d. Stateful packet filtering

Pregunta 9

Pregunta
____ switches are connected directly to the devices on a network.
Respuesta
  • a. Distribution
  • b. Workgroup
  • c. Core
  • d. Intermediate

Pregunta 10

Pregunta
NAT replaces a private IP address with a(n) [blank_start]public[blank_end] IP address.
Respuesta
  • public

Pregunta 11

Pregunta
The key to the OSI reference model is [blank_start]layers[blank_end].
Respuesta
  • layers

Pregunta 12

Pregunta
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
Respuesta
  • True
  • False

Pregunta 13

Pregunta
Workgroup switches must work faster than core switches.
Respuesta
  • True
  • False

Pregunta 14

Pregunta
A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.
Respuesta
  • a. VPN server
  • b. proxy server
  • c. telnet server
  • d. DNS server

Pregunta 15

Pregunta
A ____ is a network device that can forward packets across computer networks.
Respuesta
  • a. bridge
  • b. switch
  • c. router
  • d. firewall
Mostrar resumen completo Ocultar resumen completo

Similar

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_02
865 538
nsf_09(11)
865 538
nsf_04(15)
865 538
nsf_05(4)
865 538
nsf_01
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
EL SIGLO XVIII EN ESPAÑA: LA MONARQUÍA BORBÓNICA
maya velasquez