Deck 6: Network Security Devices, Design, and Technology

ملء الشاشة (f)
exit full mode
سؤال
NAT is not a specific device,technology,or protocol.It is a technique for substituting IP addresses.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Select the technology that can be used to examine content through application-level filtering.

A)Application gateway
B)Security proxy
C)Web security gateway
D)Firewall
سؤال
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
سؤال
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?

A)Stateful frame filtering
B)Stateless frame filtering
C)Stateful packet filtering
D)Stateless packet filtering
سؤال
A security advantage of VLANs is that they can be used to prevent direct communication between servers.
سؤال
What technology enables authorized users to use an unsecured public network,such as the Internet as if it were a secure private network?

A)IKE tunnel
B)VPN
C)endpoint
D)router
سؤال
One use of data loss prevention (DLP)is blocking the copying of files to a USB flash drive.
سؤال
Workgroup switches must work faster than core switches.
سؤال
All modern operating systems include a hardware firewall,usually called a host-based firewall.
سؤال
What data unit is associated with the Open Systems Interconnection layer four?

A)segment
B)packet
C)frame
D)bit
سؤال
The OSI model breaks networking steps down into a series of six layers.
سؤال
What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?

A)forward proxy server
B)DNS server
C)VPN server
D)telnet server
سؤال
An administrator has two servers that host the same web content,but only one server is utilized at a given time.What can be configured that can help to evenly distribute work across the network,and make use of both servers in a manner that is transparent to the end users?

A)stateful packet filtering
B)Load balancing
C)failover servers
D)proxy servers
سؤال
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?

A)switch
B)router
C)firewall
D)hub
سؤال
An intranet is a separate open network that anyone can access without prior authorization.
سؤال
Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?

A)forward proxy
B)application proxy
C)system proxy
D)reverse proxy
سؤال
Anomaly monitoring is designed for detecting statistical anomalies.
سؤال
What data unit is associated with the Open Systems Interconnection layer two?

A)segment
B)packet
C)frame
D)bit
سؤال
An agent may be a permanent NAC agent and reside on end devices until uninstalled,but it cannot be a dissolvable NAC agent.
سؤال
What kind of networking device forwards packets across different computer networks by reading destination addresses?

A)switch
B)router
C)bridge
D)firewall
سؤال
When a private network uses a single public IP address,and each outgoing TCP packet uses a different port to allow for proper translation,what networking technology is in use?

A)PAT
B)PNAT
C)NAPT
D)NAT
سؤال
What vendor neutral protocol implements support for VLAN tagging?

A)ISL
B)VTP
C)802.1Q
D)VSTP
سؤال
What dedicated hardware device aggregates hundreds or thousands of VPN connections?

A)VPN server
B)VPN gateway
C)VPN switch
D)VPN concentrator
سؤال
What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS?processing?

A)SSL/TLS accelerator
B)media gateway
C)SSL decryptor
D)security module
سؤال
A web server must be accessible to untrusted outside users.What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?

A)Install a VPN,configure host
B)Set up a proxy in front of the web server
C)Create a DMZ,add necessary hosts.
D)Configure a reduction point on a firewall
سؤال
The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches.How can this be done?

A)Create a subnet for each network switch in use
B)Create additional subnets for the separate groups
C)Add all users to a single network segment
D)Create a VLAN and add the users' computers / ports to the correct VLAN
سؤال
If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?

A)physical network segregation
B)complete network segregation
C)network isolation
D)logical network segregation
سؤال
What type of dedicated cryptographic processor that provides protection for cryptographic keys?

A)SSL/TLS accelerator
B)media gateway
C)SSL decryptor
D)hardware security module
سؤال
What type of monitoring compares network traffic,activities,transactions,or behavior against a database of known attack patterns?

A)application-based
B)protocol-based
C)behavioral-based
D)signature-based
سؤال
When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet,what technology is being used?

A)priority tunnel
B)split tunneling
C)full tunnel
D)shared tunneling
سؤال
Which of the following is a software-based application that runs on a local host computer that can detect an attack as?it occurs?

A)local-based intrusion detection system
B)host-based intrusion detection system
C)host-based application protection
D)local-based application protection
سؤال
What type of network is a private network that can also be accessed by authorized external customers,vendors,and partners?

A)extranet
B)intranet
C)enterprise network
D)guest network
سؤال
What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?

A)extranet
B)intranet
C)enterprise network
D)guest network
سؤال
Which of the following is a system of security tools that are used to recognize and identify data that is critical to the organization and ensure that it is protected?

A)USB blocking
B)content inspection
C)storage sensors
D)data loss prevention
سؤال
Which of the following is defined as a security analysis of the transaction within its approved context?

A)USB blocking
B)content inspection
C)storage sensors
D)data loss prevention
سؤال
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?

A)agentless NAC
B)dissolvable NAC
C)dependent NAC
D)permanent NAC
سؤال
What term is used to describe the software agents that are used by NAC and installed on devices to gather information?

A)NAC check agents
B)server health agents
C)host agent health checks
D)network health agents
سؤال
What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network?

A)network access control
B)virtual LANs
C)network address translation
D)host health checks
سؤال
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?

A)system call
B)unit call
C)hardware instruction
D)system exception
سؤال
Which network address below is not a private IP address network?

A)10.4.5.0
B)172.63.255.0
C)192.168.255.0
D)172.17.16.0
سؤال
What is the difference between anomaly based monitoring and signature based monitoring?
سؤال
List and describe two advantages of a proxy server.
سؤال
Describe how Internet content filters are used.
سؤال
How does a Unified Threat Management (UTM)security product help reduce administrative overhead?
سؤال
Describe how Network Access Control (NAC)works.
سؤال
Discuss the two advantages that NAT provides.
سؤال
What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?
سؤال
Describe how VLAN communication takes place.
سؤال
Describe the difference between subnetting and VLANs.
سؤال
Describe how a mail gateway operates?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Network Security Devices, Design, and Technology
1
NAT is not a specific device,technology,or protocol.It is a technique for substituting IP addresses.
True
2
Select the technology that can be used to examine content through application-level filtering.

A)Application gateway
B)Security proxy
C)Web security gateway
D)Firewall
C
3
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
True
4
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?

A)Stateful frame filtering
B)Stateless frame filtering
C)Stateful packet filtering
D)Stateless packet filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
A security advantage of VLANs is that they can be used to prevent direct communication between servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What technology enables authorized users to use an unsecured public network,such as the Internet as if it were a secure private network?

A)IKE tunnel
B)VPN
C)endpoint
D)router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
One use of data loss prevention (DLP)is blocking the copying of files to a USB flash drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Workgroup switches must work faster than core switches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
All modern operating systems include a hardware firewall,usually called a host-based firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
What data unit is associated with the Open Systems Interconnection layer four?

A)segment
B)packet
C)frame
D)bit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
The OSI model breaks networking steps down into a series of six layers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?

A)forward proxy server
B)DNS server
C)VPN server
D)telnet server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
An administrator has two servers that host the same web content,but only one server is utilized at a given time.What can be configured that can help to evenly distribute work across the network,and make use of both servers in a manner that is transparent to the end users?

A)stateful packet filtering
B)Load balancing
C)failover servers
D)proxy servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?

A)switch
B)router
C)firewall
D)hub
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
An intranet is a separate open network that anyone can access without prior authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?

A)forward proxy
B)application proxy
C)system proxy
D)reverse proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Anomaly monitoring is designed for detecting statistical anomalies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What data unit is associated with the Open Systems Interconnection layer two?

A)segment
B)packet
C)frame
D)bit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
An agent may be a permanent NAC agent and reside on end devices until uninstalled,but it cannot be a dissolvable NAC agent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
What kind of networking device forwards packets across different computer networks by reading destination addresses?

A)switch
B)router
C)bridge
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
When a private network uses a single public IP address,and each outgoing TCP packet uses a different port to allow for proper translation,what networking technology is in use?

A)PAT
B)PNAT
C)NAPT
D)NAT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What vendor neutral protocol implements support for VLAN tagging?

A)ISL
B)VTP
C)802.1Q
D)VSTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
What dedicated hardware device aggregates hundreds or thousands of VPN connections?

A)VPN server
B)VPN gateway
C)VPN switch
D)VPN concentrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS?processing?

A)SSL/TLS accelerator
B)media gateway
C)SSL decryptor
D)security module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A web server must be accessible to untrusted outside users.What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?

A)Install a VPN,configure host
B)Set up a proxy in front of the web server
C)Create a DMZ,add necessary hosts.
D)Configure a reduction point on a firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches.How can this be done?

A)Create a subnet for each network switch in use
B)Create additional subnets for the separate groups
C)Add all users to a single network segment
D)Create a VLAN and add the users' computers / ports to the correct VLAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?

A)physical network segregation
B)complete network segregation
C)network isolation
D)logical network segregation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What type of dedicated cryptographic processor that provides protection for cryptographic keys?

A)SSL/TLS accelerator
B)media gateway
C)SSL decryptor
D)hardware security module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What type of monitoring compares network traffic,activities,transactions,or behavior against a database of known attack patterns?

A)application-based
B)protocol-based
C)behavioral-based
D)signature-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet,what technology is being used?

A)priority tunnel
B)split tunneling
C)full tunnel
D)shared tunneling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is a software-based application that runs on a local host computer that can detect an attack as?it occurs?

A)local-based intrusion detection system
B)host-based intrusion detection system
C)host-based application protection
D)local-based application protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What type of network is a private network that can also be accessed by authorized external customers,vendors,and partners?

A)extranet
B)intranet
C)enterprise network
D)guest network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?

A)extranet
B)intranet
C)enterprise network
D)guest network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is a system of security tools that are used to recognize and identify data that is critical to the organization and ensure that it is protected?

A)USB blocking
B)content inspection
C)storage sensors
D)data loss prevention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is defined as a security analysis of the transaction within its approved context?

A)USB blocking
B)content inspection
C)storage sensors
D)data loss prevention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?

A)agentless NAC
B)dissolvable NAC
C)dependent NAC
D)permanent NAC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
What term is used to describe the software agents that are used by NAC and installed on devices to gather information?

A)NAC check agents
B)server health agents
C)host agent health checks
D)network health agents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network?

A)network access control
B)virtual LANs
C)network address translation
D)host health checks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?

A)system call
B)unit call
C)hardware instruction
D)system exception
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which network address below is not a private IP address network?

A)10.4.5.0
B)172.63.255.0
C)192.168.255.0
D)172.17.16.0
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is the difference between anomaly based monitoring and signature based monitoring?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
List and describe two advantages of a proxy server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe how Internet content filters are used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
How does a Unified Threat Management (UTM)security product help reduce administrative overhead?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe how Network Access Control (NAC)works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Discuss the two advantages that NAT provides.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe how VLAN communication takes place.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Describe the difference between subnetting and VLANs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Describe how a mail gateway operates?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.