Chapter 7 Flashcards
What layer of the OSI model is responsible for permitting two parties on a network to hold ongoing communications across the network?
Question options:
Network
Data Link
Session
Presentation
Session
Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed. A) Network B) Data Link C) Session D) Presentation
Network
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?
Question options:
switch
router
firewall
hub
hub
What kind of networking device forwards packets across different computer networks by reading destination addresses?
Question options:
switch
router
bridge
firewall
router
An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured to make use of both servers in a manner that is transparent to the end users?
Question options:
Stateful packet filtering
Load balancing
DNS caching
DNS poisoning
Load balancing
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?
Question options:
Stateful frame filtering
Stateless frame filtering
Stateful packet filtering
Stateless packet filtering
Stateful packet filtering
What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user? A) proxy server B) DNS server C) VPN server D) telnet server
proxy server
A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:
Question options:
forward proxy
application proxy
system proxy
reverse proxy
reverse proxy
What technology enables authorized users to use an unsecured public network, such as the Internet, as if were a secure private network?
Question options:
IKE tunnel
VPN
endpoint
router
VPN
Select below the technology that can be used to examine content through application-level filtering:
Question options:
Application gateway
Security proxy
Web security gateway
Firewall
Web security gateway
What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
Question options:
Application
Protocol
Packet
Signature
Signature
What is the name for an instruction that interrupts a program being executed and requests a service from the operating system? A) system call B) unit call C) hardware instruction D) system exception
system call
When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use? A) PAT B) PNAT C) NAPT D) NAT
PAT
Which network address below is not a private IP address network?
Question options:
- 4.5.0
- 63.255.0
- 168.255.0
- 17.16.0
172.63.255.0
A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?
Question options:
Install a bastion, configure host
Set up a choke in front of the web server
Create a DMZ, add necessary hosts.
Configure a reduction point on a firewall
Create a DMZ, add necessary hosts.