click below
click below
Normal Size Small Size show me how
Chapter 7 RQ's
| Question | Answer |
|---|---|
| Which secure feature does a load balancer NOT provide? | filter packets based on protocol settings |
| Which of these would not be filtering mechanisms found in a firewall rule? | date |
| A(n) __ can identify the application that send packets and then make decisions about filtering based on it. | application-aware firewall |
| Which function doesn't Internet content filter not perform? | intrusion detection |
| How does network address translation improves security? | It discards unsolicited packets, it filters based on protocol, it masks the IP address of the NAT device |
| How does a virtual LAN allow devices to be grouped? | logically |
| Which device is easiest for an attacker to take advantage of in order to capture and analyze packets? | hub |
| Which of these is not an attack against the switch? | ARP address impersonation |
| Which statement regarding a demilitarized zone is not true? | it contains servers that are used only by internal network users |
| Which statement about network address translation is true? | it removes private addresses when the packet leaves the network |
| Which of these is not an advantage of a load balancer? | the risk of overloading a desktop client is reduced |
| A(n) __ intercepts internal user request and then processes those requests on the half of the users? | proxy server |
| A reverse proxy __ | routes incoming requests to the correct server |
| Which is the preferred location for installation of a spam filter? | with the SMTP server |
| A __ watches for attacks and sounds alert only when one occurs. | unified threat management |
| Each of these can be used to hide information about the internal network except | a protocol analyzer |
| What is the difference between the network intrusion detection system and a network intrusion prevention system? | a nips can take actions more quickly to combat an attack |
| If a device is determined to have an out-of-date virus signature file, then network access control can redirect that device to a network by __ | address resolution protocol poisoning |
| A firewall using __ is the most secure type of firewall. | statefull packet filtering |