Week 7

10 September 2022
4.7 (114 reviews)
25 test answers

Unlock all answers in this set

Unlock answers (21)
question
Which network address below is not a private IP address network?
answer
172.63.255.0
question
The management in your corporate office want to group users on the network together logically even though they are attached to separate network switches. How can this be done?
answer
Create a VLAN and add the users' computers / ports to the VLAN.
question
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?
answer
hub
question
What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
answer
Signature
question
An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured to make use of both servers in a manner that is transparent to the end users?
answer
Load balancing
question
A load balancer that works with the File Transfer Protocol is operating at what layer of the OSI model?
answer
Layer 4
question
What layer of the OSI model is responsible for permitting two parties on a network to hold ongoing communications across the network?
answer
Session
question
What technology enables authorized users to use an unsecured public network, such as the Internet, as if were a secure private network?
answer
VPN
question
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?
answer
Stateful packet filtering
question
Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed.
answer
Network
question
Workgroup switches must work faster than core switches.
answer
False
question
The OSI model breaks networking steps down into a series of six layers.
answer
False
question
What vendor neutral protocol implements support for VLAN tagging?
answer
802.1Q
question
What is the name for an instruction that interrupts a program being executed and requests a service from the operating system?
answer
system call
question
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive
answer
True
question
Select below the technology that can be used to examine content through application-level filtering:
answer
Web security gateway
question
The standard TCP/IP protocol uses IP addresses which are how many bytes in length?
answer
4
question
Defense in depth, or layered security, involves the use of multiple types of network hardware within a network.​
answer
True
question
When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?
answer
NAT
question
What kind of networking device forwards packets across different computer networks by reading destination addresses?
answer
router
question
A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:
answer
reverse proxy
question
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
answer
True
question
A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?
answer
Create a DMZ, add necessary hosts.
question
Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?
answer
Intent
question
What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
answer
proxy server