16 Flashcards
Which of the following answers refers to an STP frame?
BPDU
The term “DHCP snooping” refers to an exploit that enables operation of a rogue DHCP network server.
False
What is the name of a network security access control method in which a 48-bit physical address assigned to each network card is used to determine access to the network?
MAC filtering
A type of hardened server used as a secure gateway for remote administration of devices placed in a different security zone is known as:
Jump server
Which of the following servers would be best suited to act as an intermediary between an intranet and a screened subnet?
Jump server
In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Proxy
Which of the following statements describe the function of a forward proxy? (Select 2 answers)
- Acts on behalf of a client
- Hides the identity of a client
Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers)
- Hides the identity of a server
- Acts on behalf of a server
What are the characteristic features of a transparent proxy? (Select all that apply)
- Doesn’t require client-side configuration
- Redirects client’s requests and responses without modifying them
- Clients might be unaware of the proxy service
A nontransparent proxy: (Select 2 answers)
- Modifies client’s requests and responses
- Requires client-side configuration
A type of NIDS/NIPS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based NIDS/NIPS.
True
A NIDS/NIPS that detects intrusions by comparing network traffic against the previously established baseline can be classified as: (Select all that apply)
- Heuristic
- Anomaly-based
- Behavioral
A security administrator configured a NIDS to receive traffic from network switch via port mirroring. Which of the following terms can be used to describe the operation mode of the NIDS? (Select 2 answers)
- Passive
- Out-of-band
Which of the following answers refers to a piece of hardware and associated software/firmware designed to provide cryptographic functions?
** HSM **
HSM (Hardware Security Module)
Which of the acronyms listed below refers to a firewall controlling access to a web server?
** WAF **
A web application firewall (WAF) is a firewall that monitors, filters and blocks Hypertext Transfer Protocol (HTTP) traffic as it travels to and from a website or web application.