Networking, Appliances, Applications & Functions Flashcards

1
Q

Service-dependent filtering
the method by which a firewall examines the port numbers in Transport layer protocol headers is

A

Service-dependent filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following criteria does a firewall capable of service-dependent filtering use to block traffic?
a. Hardware addresses
b. Protocol identifiers
c. IP addresses
d. Port numbers

A

Port Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain hubs and switches in relation to collision domains

A

All of the devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Both switches and bridges process incoming packets by scanning their Data link layer hardware addresses and forwarding the packets out the port connected to the destination system. How many ports to switches and bridges have respectively?

A

Many and two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cut-through switches are fast, because

A

hey look at only the first 6 bytes (the destination media access control, or MAC, address) when forwarding a frame. They do not perform a cyclical redundancy check (CRC) on the entire frame’s contents prior to forwarding it out a port leading to the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Source route is a bridging technique in which

A

the source host, not the switch, determines the path a frame will take through a network to reach a destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Store-and-forward switches take in the

A

entire frame and verify its contents by performing a CRC calculation before forwarding it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What security measure can scan Transport layer header fields for evidence of SYN floods

A

a firewall capable of stateful packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

methods typically used by intrusion detection systems (IDSs) to analyze incoming network traffic

A

Anomaly-based detection and Signature-based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security information and event management (SIEM) systems can function as a central clearinghouse for information gathered by

A

IDSs and other security processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which piece of hardware or software connects networks by translating communications from one protocol to another

A

Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Each port on a router defines

A

a separate broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a next-generation firewall (NGFW) has

A

Deep packet inspection (DPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Content filters are a firewall feature that examine

A

the data inside packets, rather than their origin, to locate objectionable material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Load balancers typically do not use the__________________ to direct traffic since this is a factor that does not change.

A

hardware configuration of the servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A load balancer is a type of

A

Router

17
Q

Stateful packet inspection is a firewall feature that enables the device

A

to examine network and Transport layer header fields, looking for patterns that indicate damaging behaviors, such as IP spoofing, SYN floods, and teardrop attacks.