Test 12 Flashcards
A computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Proxy
Which of the answers listed below refers to a solution that simplifies web browser configurations by using predefined rules or scripts to make server selection decisions for specific web traffic?
PAC
Which of the following provides passive network security breach response on an individual computer system?
HIDS
Which of the answers listed below refer to the characteristic features of a NIDS? (Select 3 answers)
Does not take direct action to block or prevent attacks ( Missed)
Generates alerts and notifies security personnel or administrators when suspicious activity is detected ( Missed)
Monitors network traffic without direct involvement in traffic routing or packet modification
Which of the following answers refer to a NIPS? (Select 3 answers)
Takes proactive measures to block or mitigate intrusion attempts
Operates in an inline mode, actively intercepting and inspecting network traffic
Can drop or reject network packets, terminate connections, or take other actions to stop the attack
Which of the answers listed below refers to network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?
WIDS
Which of the following answers refers to network security technology designed to monitor, detect, and mitigate unauthorized access, security threats, and suspicious activities in WLANs?
WIPS
A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is known as:
Load balancer
In active-active mode, load balancers distribute network traffic across:
All servers
In active-passive mode, load balancers distribute network traffic across:
Servers marked as active
Which of the answers listed below refers to an IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?
IEEE 802.1X
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, LEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.
True
Which of the following EAP methods offers the highest level of security?
EAP-TLS
A dedicated security solution that filters, monitors, and blocks HTTP/HTTPS traffic between a web application and the Internet is called:
WAF
The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
True