Which of these is not used in scheduling a load balancer?

Scheduled maintenance: Saturday, December 10 from 10PM to 11PM PST

Show

    Home

    Subjects

    Expert solutions

    Create

    Log in

    Sign up

    Upgrade to remove ads

    Only A$47.99/year

    1. Other
    2. Computer Skills

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Terms in this set (20)

    Which of the following devices can identify the application that sends packets and then makes decisions about filtering based on it?

    application-based firewall

    Which function does an Internet content filter NOT perform?

    intrusion detection

    In which of the following configurations are all the load balancers always active?

    Active-active

    Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose?

    Split tunnel

    Which of the following is a multipurpose security device?

    Unified Threat Management (UTM)

    Which device watches for attacks and sounds an alert only when one occurs?

    network intrusion detection system (NIDS)

    Which of these is NOT used in scheduling a load balancer?

    The IP address of the destination packet

    Which of these would NOT be a filtering mechanism found in a firewall ACL rule?

    date

    Which device intercepts internal user requests and then processes those requests on behalf of the users?

    Forward proxy server

    Which of the following CANNOT be used to hide information about the internal network?

    a protocol analyzer

    Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?

    router

    How does network address translation (NAT) improve security?

    It discards unsolicited packets.

    Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian?

    Cause the device to enter a fail-open mode

    Which is the most secure type of firewall?

    stateful packet filtering

    Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization's secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?

    A bridge could permit access to the secure wired network from the unsecured wireless network

    What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?

    A NIPS can take actions more quickly to combat an attack.

    Which device is easiest for an attacker to take advantage of to capture and analyze packets?

    hub

    Which statement regarding a demilitarized zone (DMZ) is NOT true?

    It contains servers that are used only by internal network users.

    Which statement about network address translation (NAT) is true?

    It removes private addresses when the packet leaves the network.

    Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?

    Once the MAC address table is full the switch functions like a network hu

    Students also viewed

    Unit 7 Quiz

    20 terms

    likeike13

    Network Security Appliances and Technologies (Unit…

    30 terms

    Jamie_Holliday8

    Chapter 10 - Cloud and Virtualization Security

    20 terms

    Alissa_Nelson3

    ch. 11

    20 terms

    Victor_Delgadillo8

    Sets found in the same folder

    Unit 7 Quiz

    20 terms

    likeike13

    Unit 10 Quiz

    20 terms

    Danica_Taylor1

    Chapter 8 Review Questions

    20 terms

    RS_3058

    Security+ Chapter 4

    20 terms

    Greg_DeLoach6

    Other sets by this creator

    Unit 8

    20 terms

    iamcharged

    Unit 7

    20 terms

    iamcharged

    Unit 5

    20 terms

    iamcharged

    Unit 4

    20 terms

    iamcharged

    Verified questions

    other

    To avoid a situation where someone is tempted to drive after drinking, you could: A. Call ahead for a taxi to pick up you or your friends B. Get a sober designated driver to drive everyone home C. Check to see if your school has a safe ride program D. All of the above

    Verified answer

    other

    For specific guidelines on your vehicle's maintenance, make sure to ___________.

    Verified answer

    other

    The ___ probably was the first and the simplest of all machine tools.

    Verified answer

    other

    A chisel bar can be used to ___.

    Verified answer

    Other Quizlet sets

    EXSC 440 - Fitness Management - Midterm Exam essay…

    11 terms

    Josephilius1

    Sports and Disability Exam 1

    177 terms

    hugo_grangeno3

    Vegetable Production Quiz - Revision

    53 terms

    MsVassos2020Teacher