Filters
Question type

Study Flashcards

What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?


A) proxy server
B) DNS server
C) VPN server
D) telnet server

Correct Answer

verifed

verified

What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?


A) Application
B) Protocol
C) Packet
D) Signature

Correct Answer

verifed

verified

A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:


A) forward proxy
B) application proxy
C) system proxy
D) reverse proxy

Correct Answer

verifed

verified

Matching -A monitoring technique used by an intrusion detection system (IDS) that uses an algorithm to determine if a threat exists​


A) Application-aware firewall
B) Application-aware IPS
C) Content inspection
D) Heuristic monitoring
E) Malware inspection
F) Network address translation (NAT)
G) Router
H) Switch
I) Virtual LAN (VLAN)
J) VPN Concentrator

Correct Answer

verifed

verified

What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?

Correct Answer

verifed

verified

The Post Office Prot...

View Answer

Matching -​Searching for malware in incoming web content


A) Application-aware firewall
B) Application-aware IPS
C) Content inspection
D) Heuristic monitoring
E) Malware inspection
F) Network address translation (NAT)
G) Router
H) Switch
I) Virtual LAN (VLAN)
J) VPN Concentrator

Correct Answer

verifed

verified

Describe the difference between subnetting and VLANs.

Correct Answer

verifed

verified

There are differences between subnetting...

View Answer

Describe how VLAN communication takes place.

Correct Answer

verifed

verified

VLAN communication can take place in two...

View Answer

Discuss the two advantages that NAT provides.

Correct Answer

verifed

verified

NAT has two advantages. First, it masks ...

View Answer

Select below the technology that can be used to examine content through application-level filtering:


A) Application gateway
B) Security proxy
C) Web security gateway
D) Firewall

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer