Ch. 6 ~ Network Security Flashcards
Which of the following is true about subnetting?
A. It requires the use of a Class B network
B. It divides the network IP address on the boundaries between bytes.
C. It provides very limited security protection.
D. It is also called subnet addressing.
It is also called subnet addressing
A virtual LAN (VLAN) allows devices to be grouped \_\_\_\_\_\_\_\_\_\_\_\_\_. A. based on subnets B. logically C. directly to hubs D. only around core switches
Logically
Which of the following devices is easiest for an attacker to take advantage of in order to capture and analyze packets? A. hub B. switch C. router D. load balancer
Hub
Which of the following is not an attack against a switch? A. MAC flooding B. ARP address impersonation C. ARP poisoning D. MAC address impersonation
ARP address impersonation
Which of the following is not true regarding a demilitarized zone (DMZ)?
A. It provides an extra degree of security
B. It typically includes an email or Web server
C. It can be configured to have one or two firewalls
D. It contains servers that are only used by internal network users
It contains servers that are only used by internal network users
A __________ firewall allows the administrator to create sets of related parameters that together define one aspect of the devices operation
Settings-based