C Danvers
Quiz por , criado more than 1 year ago

Ch 6 quiz

914
0
0
C Danvers
Criado por C Danvers mais de 6 anos atrás
Fechar

Ch 6 - Network Security Devices, Design, and Technology

Questão 1 de 40

1

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?

Selecione uma das seguintes:

  • Stateful frame filtering

  • Stateless frame filtering

  • Stateful packet filtering

  • Stateless packet filtering

Explicação

Questão 2 de 40

1

All modern operating systems include a hardware firewall, usually called a host-based firewall.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 3 de 40

1

An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?

Selecione uma das seguintes:

  • stateful packet filtering

  • load balancing

  • failover servers

  • proxy servers

Explicação

Questão 4 de 40

1

An agent may be a permanent NAC agent and reside on end devices until uninstalled, but it cannot be a dissolvable NAC agent.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 5 de 40

1

An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?

Selecione uma das seguintes:

  • switch

  • router

  • firewall

  • hub

Explicação

Questão 6 de 40

1

An intranet is a separate open network that anyone can access without prior authorization.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 7 de 40

1

Anomaly monitoring is designed for detecting statistical anomalies.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 8 de 40

1

A security advantage of VLANs is that they can be used to prevent direct communication between servers.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 9 de 40

1

A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?

Selecione uma das seguintes:

  • Install a VPN, configure host

  • Set up a proxy in front of the web server

  • Create a DMZ, add necessary hosts

  • Configure a reduction point on a firewall

Explicação

Questão 10 de 40

1

Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 11 de 40

1

If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?

Selecione uma das seguintes:

  • physical network segregation

  • complete network segregation

  • network isolation

  • logical network segregation

Explicação

Questão 12 de 40

1

NAT is not a specific device, technology, or protocol. It is a technique for substituting IP addresses.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 13 de 40

1

One use of data loss prevention (DLP) is blocking the copying of files to a USB flash drive.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 14 de 40

1

Select the technology that can be used to examine content through application-level filtering.

Selecione uma das seguintes:

  • Application gateway

  • Security proxy

  • Web security gateway

  • Firewall

Explicação

Questão 15 de 40

1

The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches. How can this be done?

Selecione uma das seguintes:

  • Create a subnet for each network switch in use

  • Create additional subnets for the separate groups

  • Add all users to a single network segment

  • Create a VLAN and add the users' computers/ports to the correct VLAN

Explicação

Questão 16 de 40

1

The OSI model breaks networking steps down into a series of six layers.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 17 de 40

1

What data unit is associated with the Open Systems Interconnection layer four?

Selecione uma das seguintes:

  • segment

  • packet

  • frame

  • bit

Explicação

Questão 18 de 40

1

What data unit is associated with the Open Systems Interconnection layer two?

Selecione uma das seguintes:

  • segment

  • packet

  • frame

  • bit

Explicação

Questão 19 de 40

1

What dedicated hardware device aggregates hundreds or thousands of VPN connections?

Selecione uma das seguintes:

  • VPN server

  • VPN gateway

  • VPN switch

  • VPN concentrator

Explicação

Questão 20 de 40

1

What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?

Selecione uma das seguintes:

  • forward proxy server

  • DNS server

  • VPN server

  • telnet server

Explicação

Questão 21 de 40

1

What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?

Selecione uma das seguintes:

  • system call

  • unit call

  • hardware instruction

  • system exception

Explicação

Questão 22 de 40

1

What kind of networking device forwards packets across different computer networks by reading destination addresses?

Selecione uma das seguintes:

  • switch

  • router

  • bridge

  • firewall

Explicação

Questão 23 de 40

1

What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS processing?

Selecione uma das seguintes:

  • SSL/TLS accelerator

  • media gateway

  • SSL decryptor

  • security module

Explicação

Questão 24 de 40

1

What technology enables authorized users to use an unsecured public network, such as the Internet as if it were a secure private network?

Selecione uma das seguintes:

  • IKE tunnel

  • VPN

  • endpoint

  • router

Explicação

Questão 25 de 40

1

What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network?

Selecione uma das seguintes:

  • network access control

  • virtual LANs

  • network address translation

  • host health checks

Explicação

Questão 26 de 40

1

What term is used to describe the software agents that are used by NAC and installed on devices to gather information?

Selecione uma das seguintes:

  • NAC check agents

  • server health agents

  • host agent health checks

  • network health agents

Explicação

Questão 27 de 40

1

What type of dedicated cryptographic processor that provides protection for cryptographic keys?

Selecione uma das seguintes:

  • SSL/TLS accelerator

  • media gateway

  • SSL decryptor

  • hardware security module

Explicação

Questão 28 de 40

1

What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?

Selecione uma das seguintes:

  • application-based

  • protocol-based

  • behavioral-based

  • signature-based

Explicação

Questão 29 de 40

1

What type of network access control uses Active Directory to scan a device to verify that it is in compliance?

Selecione uma das seguintes:

  • agentless NAC

  • dissolvable NAC

  • dependent NAC

  • permanent NAC

Explicação

Questão 30 de 40

1

What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?

Selecione uma das seguintes:

  • extranet

  • intranet

  • enterprise network

  • guest network

Explicação

Questão 31 de 40

1

What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?

Selecione uma das seguintes:

  • extranet

  • intranet

  • enterprise network

  • guest network

Explicação

Questão 32 de 40

1

What vendor neutral protocol implements support for VLAN tagging?

Selecione uma das seguintes:

  • ISL

  • VTP

  • 802.1Q

  • VSTP

Explicação

Questão 33 de 40

1

When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?

Selecione uma das seguintes:

  • PAT

  • PNAT

  • NAPT

  • NAT

Explicação

Questão 34 de 40

1

When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, what technology is being used?

Selecione uma das seguintes:

  • priority tunnel

  • split tunneling

  • full tunnel

  • shared tunneling

Explicação

Questão 35 de 40

1

Which network address below is not a private IP address network?

Selecione uma das seguintes:

  • 10.4.5.0

  • 172.63.255.0

  • 192.168.255.0

  • 172.17.16.0

Explicação

Questão 36 de 40

1

Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?

Selecione uma das seguintes:

  • forward proxy

  • application proxy

  • system proxy

  • reverse proxy

Explicação

Questão 37 de 40

1

Which of the following is a software-based application that runs on a local host computer that can detect an attack as it occurs?

Selecione uma das seguintes:

  • local-based intrusion detection system

  • host-based intrusion detection system

  • host-based application protection

  • local-based application protection

Explicação

Questão 38 de 40

1

Which of the following is a system of security tools that are used to recognize and identify data that is critical to the organization and ensure that it is protected?

Selecione uma das seguintes:

  • USB blocking

  • content inspection

  • storage sensors

  • data loss prevention

Explicação

Questão 39 de 40

1

Which of the following is defined as a security analysis of the transaction within its approved context?

Selecione uma das seguintes:

  • USB blocking

  • content inspection

  • storage sensors

  • data loss prevention

Explicação

Questão 40 de 40

1

Workgroup switches must work faster than core switches.

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação