A(n) ____ encrypts all data that is transmitted between the remote device and the network.
a. router
b. endpoint
c. VPN
d. IKE tunnel
A(n) ____ is the end of the tunnel between VPN devices.
a. endpoint
b. server
c. client
d. proxy
Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring
a. signature
b. packet
c. application
d. protocol
IP addresses are ____-bit addresses.
a. 8
b. 32
c. 16
d. 4
Layer 3 of the OSI model is the ____ layer.
a. Network
b. Presentation
c. Session
d. Data Link
____ IP addresses are IP addresses that are not assigned to any specific user or organization.
a. Public
b. Private domain
c. Private
d. Public domain
____ is a technique that allows private IP addresses to be used on the public Internet.
a. NAT
b. PNAT
c. PAT
d. NAPT
____ is a technology that can help to evenly distribute work across a network.
a. Load balancing
b. DNS caching
c. DNS poisoning
d. Stateful packet filtering
____ switches are connected directly to the devices on a network.
a. Distribution
b. Workgroup
c. Core
d. Intermediate
NAT replaces a private IP address with a(n) IP address.
The key to the OSI reference model is .
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
Workgroup switches must work faster than core switches.
A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.
a. VPN server
b. proxy server
c. telnet server
d. DNS server
A ____ is a network device that can forward packets across computer networks.
a. bridge
b. switch
c. router
d. firewall