Filters
Question type

Study Flashcards

How does a Unified Threat Management (UTM)security product help reduce administrative overhead?

Correct Answer

verifed

verified

A UTM security product combine...

View Answer

What kind of networking device forwards packets across different computer networks by reading destination addresses?


A) switch
B) router
C) bridge
D) firewall

Correct Answer

verifed

verified

What data unit is associated with the Open Systems Interconnection layer four?


A) segment
B) packet
C) frame
D) bit

Correct Answer

verifed

verified

If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?


A) physical network segregation
B) complete network segregation
C) network isolation
D) logical network segregation

Correct Answer

verifed

verified

An administrator has two servers that host the same web content,but only one server is utilized at a given time.What can be configured that can help to evenly distribute work across the network,and make use of both servers in a manner that is transparent to the end users?


A) stateful packet filtering
B) Load balancing
C) failover servers
D) proxy servers

Correct Answer

verifed

verified

What is the difference between anomaly based monitoring and signature based monitoring?

Correct Answer

verifed

verified

Anomaly based monitoring invol...

View Answer

Discuss the two advantages that NAT provides.

Correct Answer

verifed

verified

NAT has two advantages.First,it masks th...

View Answer

Which of the following is a system of security tools that are used to recognize and identify data that is critical to the organization and ensure that it is protected?


A) USB blocking
B) content inspection
C) storage sensors
D) data loss prevention

Correct Answer

verifed

verified

All modern operating systems include a hardware firewall,usually called a host-based firewall.

Correct Answer

verifed

verified

False

List and describe two advantages of a proxy server.

Correct Answer

verifed

verified

Increased speed - because proxy servers ...

View Answer

The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches.How can this be done?


A) Create a subnet for each network switch in use
B) Create additional subnets for the separate groups
C) Add all users to a single network segment
D) Create a VLAN and add the users' computers / ports to the correct VLAN

Correct Answer

verifed

verified

An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?


A) switch
B) router
C) firewall
D) hub

Correct Answer

verifed

verified

Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.

Correct Answer

verifed

verified

True

Workgroup switches must work faster than core switches.

Correct Answer

verifed

verified

When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet,what technology is being used?


A) priority tunnel
B) split tunneling
C) full tunnel
D) shared tunneling

Correct Answer

verifed

verified

What type of network access control uses Active Directory to scan a device to verify that it is in compliance?


A) agentless NAC
B) dissolvable NAC
C) dependent NAC
D) permanent NAC

Correct Answer

verifed

verified

What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?


A) system call
B) unit call
C) hardware instruction
D) system exception

Correct Answer

verifed

verified

A

What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS?processing?


A) SSL/TLS accelerator
B) media gateway
C) SSL decryptor
D) security module

Correct Answer

verifed

verified

Describe the difference between subnetting and VLANs.

Correct Answer

verifed

verified

There are differences between subnetting...

View Answer

Which of the following is a software-based application that runs on a local host computer that can detect an attack as?it occurs?


A) local-based intrusion detection system
B) host-based intrusion detection system
C) host-based application protection
D) local-based application protection

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer