Filters
Question type

Study Flashcards

What type of monitoring compares network traffic,activities,transactions,or behavior against a database of known attack patterns?


A) application-based
B) protocol-based
C) behavioral-based
D) signature-based

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Select the technology that can be used to examine content through application-level filtering.


A) Application gateway
B) Security proxy
C) Web security gateway
D) Firewall

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What data unit is associated with the Open Systems Interconnection layer two?


A) segment
B) packet
C) frame
D) bit

E) None of the above
F) All of the above

Correct Answer

verifed

verified

NAT is not a specific device,technology,or protocol.It is a technique for substituting IP addresses.

A) True
B) False

Correct Answer

verifed

verified

When a private network uses a single public IP address,and each outgoing TCP packet uses a different port to allow for proper translation,what networking technology is in use?


A) PAT
B) PNAT
C) NAPT
D) NAT

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A web server must be accessible to untrusted outside users.What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?


A) Install a VPN,configure host
B) Set up a proxy in front of the web server
C) Create a DMZ,add necessary hosts.
D) Configure a reduction point on a firewall

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is defined as a security analysis of the transaction within its approved context?


A) USB blocking
B) content inspection
C) storage sensors
D) data loss prevention

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A security advantage of VLANs is that they can be used to prevent direct communication between servers.

A) True
B) False

Correct Answer

verifed

verified

The OSI model breaks networking steps down into a series of six layers.

A) True
B) False

Correct Answer

verifed

verified

Describe how Internet content filters are used.

Correct Answer

verifed

verified

Internet content filters monitor Interne...

View Answer

Showing 41 - 50 of 50

Related Exams

Show Answer