What kind of networking device forwards packets across different computer networks by reading destination address?

Question # 01Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.a. True b. False

Show

Question # 02An intranet is a separate open network that anyone can access with out prior authorization.a. True b. False

Question # 03One use of data loss prevention (DLP) is blocking the copying of files to a USB flash drive.a. True b. False

Question # 04Anomaly monitoring is designed for detecting statistical anomalies.a. True b. False

Question # 05What data unit is associated with the Open Systems Interconnection layer four?a. segmentb. packetc. framed. bit

Question # 06What kind of networking device forwards packets across different computer networks by reading destination addresses?a. switchb. routerc. bridged. firewall

Question # 07An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?a. stateful packet filteringb. Load balancingc. failover serversd. proxy servers

Question # 08A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?a. Stateful frame filteringb. Stateless frame filteringc. Stateful packet filteringd. Stateless packet filtering

c. Stateful packet filtering

Question # 09What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?a. forward proxy serverb. DNS serverc. VPN serverd. telnet server

Question # 10Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?a. forward proxyb. application proxyc. system proxyd. reverse proxy

Question # 11What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?a. application-basedb. protocol-basedc. behavioral-basedd. signature-based

Question # 12What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?a. system callb. unit callc. hardware instructiond. system exception

Question # 13When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?a. PATb. PNATc. NAPTd. NAT

Question # 14Which network address below is not a private IP address network?a. 10.4.5.0b. 172.63.255.0c. 192.168.255.0d. 172.17.16.0

Question # 15What vendor neutral protocol implements support for VLAN tagging?a. ISLb. VTPc. 802.1Qd. VSTP

Question # 16The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches. How can this be done?a. Create a subnet for each network switch in useb. Create additional subnets for the separate groupsc. Add all users to a single network segmentd. Create a VLAN and add the users’ computers / ports to the correct VLAN

d. Create a VLAN and add the users’ computers / ports to the correct VLAN

Question # 17What type of dedicated cryptographic processor that provides protection for cryptographic keys?a. SSL/TLS acceleratorb. media gatewayc. SSL decryptord. hardware security module

d. hardware security module

Question # 18Which of the following is a software-based application that runs on a local host computer that can detect an attack as it occurs? a. local-based intrusion detection systemb. host-based intrusion detection systemc. host-based application protectiond. local-based application protection

b. host-based intrusion detection system

Question # 19When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, what technology is being used?a. priority tunnelb. split tunnelingc. full tunneld. shared tunneling

Question # 20What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?a. extranetb. intranetc. enterprise networkd. guest network

Question # 21If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?a. physical network segregationb. complete network segregationc. network isolationd. logical network segregation

a. physical network segregation

Question # 22What term is used to describe the software agents that are used by NAC and installed on devices to gather information?a. NAC check agentsb. server health agentsc. host agent health checksd. network health agents

c. host agent health checks

Question # 23Describe how Network Access Control (NAC) works.Network Access Control assesses the condition of a device before allowing connection to a network. Any system not meeting the minimum security requirements is placed in quarantine and allowed to correct deficiencies before retesting against the NAC for access. (adsbygoogle = window.adsbygoogle || []).push({});

NAC examines the current state of a system or network device before it is allowed to connect to the network. Any device that does not meet a specified set of criteria, such as having the most current anti-virus signature or the software firewall properly enabled, is only allowed to connect to a "quarantine" network where the security deficiencies are corrected. After the problems are solved, the device is connected to the normal network. The goal of NAC is to prevent computers with suboptimal security from potentially infecting other computers through the network.

What layer of the OSI model is responsible for permitting two parties on a network to hold ongoing communications across the network?Question options:NetworkData LinkSessionPresentation

Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed.A) NetworkB) Data LinkC) SessionD) Presentation

An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?Question options:switchrouterfirewallhub

What kind of networking device forwards packets across different computer networks by reading destination addresses?Question options:switchrouterbridgefirewall

An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured to make use of both servers in a manner that is transparent to the end users?Question options:Stateful packet filteringLoad balancingDNS cachingDNS poisoning

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?Question options:Stateful frame filteringStateless frame filteringStateful packet filteringStateless packet filtering

Stateful packet filtering

What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?A) proxy serverB) DNS serverC) VPN serverD) telnet server

A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:Question options:forward proxyapplication proxysystem proxyreverse proxy

What technology enables authorized users to use an unsecured public network, such as the Internet, as if were a secure private network?Question options:IKE tunnelVPNendpointrouter

Select below the technology that can be used to examine content through application-level filtering:Question options:Application gatewaySecurity proxyWeb security gatewayFirewall

What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?Question options:ApplicationProtocolPacketSignature

What is the name for an instruction that interrupts a program being executed and requests a service from the operating system?A) system callB) unit callC) hardware instructionD) system exception

When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?A) PATB) PNATC) NAPTD) NAT

Which network address below is not a private IP address network?Question options:10.4.5.0172.63.255.0192.168.255.0172.17.16.0

A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?Question options:Install a bastion, configure hostSet up a choke in front of the web serverCreate a DMZ, add necessary hosts.Configure a reduction point on a firewall

Create a DMZ, add necessary hosts.

The IPv4 protocol uses IP addresses which are how many bytes in length?A) 4B) 8C) 16D) 32

What vendor neutral protocol implements support for VLAN tagging?Question options:ISLVTP802.1QVSTP

The management in your corporate office want to group users on the network together logically even though they are attached to separate network switches. How can this be done?Question options:Create a subnet for each network switch involved.Create additional broadcast domains for the users.Add all users to a single DMZ segmentCreate a VLAN and add the users' computers / ports to the VLAN.

Create a VLAN and add the users' computers / ports to the VLAN.

​Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?Question options:​Source address​Destination port​Direction​Intent

A load balancer that works with the File Transfer Protocol is operating at what layer of the OSI model?Question options:​Layer 1​Layer 2​Layer 4​Layer 7