Scheduled maintenance: Saturday, December 10 from 10PM to 11PM PST Show
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only A$47.99/year
Terms in this set (20)Which of the following devices can identify the application that sends packets and then makes decisions about filtering based on it? application-based firewall Which function does an Internet content filter NOT perform? intrusion detection In which of the following configurations are all the load balancers always active? Active-active Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose? Split tunnel Which of the following is a multipurpose security device? Unified Threat Management (UTM) Which device watches for attacks and sounds an alert only when one occurs? network intrusion detection system (NIDS) Which of these is NOT used in scheduling a load balancer? The IP address of the destination packet
Which of these would NOT be a filtering mechanism found in a firewall ACL rule? date Which device intercepts internal user requests and then processes those requests on behalf of the users? Forward proxy server Which of the following CANNOT be used to hide information about the internal network? a protocol analyzer Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend? router How does network address translation (NAT) improve security? It discards unsolicited packets. Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian? Cause the device to enter a fail-open mode Which is the most secure type of firewall? stateful packet filtering Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization's secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia? A bridge could permit access to the secure wired network from the unsecured wireless network What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)? A NIPS can take actions more quickly to combat an attack. Which device is easiest for an attacker to take advantage of to capture and analyze packets? hub Which statement regarding a demilitarized zone (DMZ) is NOT true? It contains servers that are used only by internal network users. Which statement about network address translation (NAT) is true? It removes private addresses when the packet leaves the network. Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say? Once the MAC address table is full the switch functions like a network hu Students also viewedUnit 7 Quiz20 terms likeike13 Network Security Appliances and Technologies (Unit…30 terms Jamie_Holliday8 Chapter 10 - Cloud and Virtualization Security20 terms Alissa_Nelson3 ch. 1120 terms Victor_Delgadillo8 Sets found in the same folderUnit 7 Quiz20 terms likeike13 Unit 10 Quiz20 terms Danica_Taylor1 Chapter 8 Review Questions20 terms RS_3058 Security+ Chapter 420 terms Greg_DeLoach6 Other sets by this creatorUnit 820 terms iamcharged Unit 720 terms iamcharged Unit 520 terms iamcharged Unit 420 terms iamcharged Verified questions
other To avoid a situation where someone is tempted to drive after drinking, you could: A. Call ahead for a taxi to pick up you or your friends B. Get a sober designated driver to drive everyone home C. Check to see if your school has a safe ride program D. All of the above Verified answer
other For specific guidelines on your vehicle's maintenance, make sure to ___________. Verified answer
other The ___ probably was the first and the simplest of all machine tools. Verified answer other A chisel bar can be used to ___. Verified answer Other Quizlet setsEXSC 440 - Fitness Management - Midterm Exam essay…11 terms Josephilius1 Sports and Disability Exam 1177 terms hugo_grangeno3 Vegetable Production Quiz - Revision53 terms MsVassos2020Teacher |