Chapter 06 Quiz – Network Security Devices, Design, and Technology Flashcards
Questions 23
Question # 01
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
a. True
b. False
a. True
Question # 02
An intranet is a separate open network that anyone can access with out prior authorization.
a. True
b. False
b. False
Question # 03
One use of data loss prevention (DLP) is blocking the copying of files to a USB flash drive.
a. True
b. False
a. True
Question # 04
Anomaly monitoring is designed for detecting statistical anomalies.
a. True
b. False
a. True
Question # 05
What data unit is associated with the Open Systems Interconnection layer four?
a. segment
b. packet
c. frame
d. bit
a. segment
Question # 06
What kind of networking device forwards packets across different computer networks by reading destination addresses?
a. switch
b. router
c. bridge
d. firewall
b. router
Question # 07
An administrator has two servers that host the same web content, but only one server is utilized at a given time.
What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?
a. stateful packet filtering
b. Load balancing
c. failover servers
d. proxy servers
b. Load balancing
Question # 08
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?
a. Stateful frame filtering
b. Stateless frame filtering
c. Stateful packet filtering
d. Stateless packet filtering
c. Stateful packet filtering
Question # 09
What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
a. forward proxy server
b. DNS server
c. VPN server
d. telnet server
a. forward proxy server
Question # 10
Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?
a. forward proxy
b. application proxy
c. system proxy
d. reverse proxy
d. reverse proxy
Question # 11
What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
a. application-based
b. protocol-based
c. behavioral-based
d. signature-based
d. signature-based
Question # 12
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?
a. system call
b. unit call
c. hardware instruction
d. system exception
a. system call
Question # 13
When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?
a. PAT
b. PNAT
c. NAPT
d. NAT
a. PAT
Question # 14
Which network address below is not a private IP address network?
a. 10.4.5.0
b. 172.63.255.0
c. 192.168.255.0
d. 172.17.16.0
b. 172.63.255.0
Question # 15
What vendor neutral protocol implements support for VLAN tagging?
a. ISL
b. VTP
c. 802.1Q
d. VSTP
c. 802.1Q