Filters
Question type

Study Flashcards

The traffic sent by devices connected to a hub can be captured and decoded by a _________________.

Correct Answer

verifed

verified

Protocol analyzer​

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?


A) Stateful frame filtering
B) Stateless frame filtering
C) Stateful packet filtering
D) Stateless packet filtering

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

​What is the difference between anomaly based monitoring and signature based monitoring?

Correct Answer

verifed

verified

​Anomaly based monitoring invo...

View Answer

Workgroup switches must work faster than core switches.

A) True
B) False

Correct Answer

verifed

verified

Matching -An intrusion prevention system that knows information such as the applications that are running as well as the underlying operating systems​


A) Application-aware firewall
B) Application-aware IPS
C) Content inspection
D) Heuristic monitoring
E) Malware inspection
F) Network address translation (NAT)
G) Router
H) Switch
I) Virtual LAN (VLAN)
J) VPN Concentrator

K) B) and E)
L) E) and I)

Correct Answer

verifed

verified

List and describe three features of Internet content filters.

Correct Answer

verifed

verified

URL and content filtering - network admi...

View Answer

How does a Unified Threat Management (UTM) security product help reduce administrative overhead?​

Correct Answer

verifed

verified

A UTM security product​ combin...

View Answer

List and describe two advantages of a proxy server.

Correct Answer

verifed

verified

Increased speed - because proxy servers ...

View Answer

Matching -A techniq​ue that allows private IP addresses to be used on the public Internet.


A) Application-aware firewall
B) Application-aware IPS
C) Content inspection
D) Heuristic monitoring
E) Malware inspection
F) Network address translation (NAT)
G) Router
H) Switch
I) Virtual LAN (VLAN)
J) VPN Concentrator

K) B) and I)
L) A) and B)

Correct Answer

verifed

verified

F

What vendor neutral protocol implements support for VLAN tagging?


A) ISL
B) VTP
C) 802.1Q
D) VSTP

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

The standard TCP/IP protocol uses IP addresses which are how many bytes in length?


A) 4
B) 8
C) 16
D) 32

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

​Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?


A) ​Source address
B) ​Destination port
C) ​Direction
D) ​Intent

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Describe how NAC works.

Correct Answer

verifed

verified

NAC examines the current state of a syst...

View Answer

Matching -Searching incoming web content to match keywords​


A) Application-aware firewall
B) Application-aware IPS
C) Content inspection
D) Heuristic monitoring
E) Malware inspection
F) Network address translation (NAT)
G) Router
H) Switch
I) Virtual LAN (VLAN)
J) VPN Concentrator

K) A) and J)
L) A) and D)

Correct Answer

verifed

verified

An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?


A) switch
B) router
C) firewall
D) hub

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What layer of the OSI model is responsible for permitting two parties on a network to hold ongoing communications across the network?


A) Network
B) Data Link
C) Session
D) Presentation

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Matching -​A firewall that can identify the applications that send packets through the firewall and then make decisions about the applications


A) Application-aware firewall
B) Application-aware IPS
C) Content inspection
D) Heuristic monitoring
E) Malware inspection
F) Network address translation (NAT)
G) Router
H) Switch
I) Virtual LAN (VLAN)
J) VPN Concentrator

K) I) and J)
L) A) and I)

Correct Answer

verifed

verified

Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed.


A) Network
B) Data Link
C) Session
D) Presentation

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

The OSI model breaks networking steps down into a series of six layers.

A) True
B) False

Correct Answer

verifed

verified

False

A ______________ is a worker who work occasionally or regularly from a home office.

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer