Test 12 Flashcards

1
Q

A computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

A

Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a solution that simplifies web browser configurations by using predefined rules or scripts to make server selection decisions for specific web traffic?

A

PAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following provides passive network security breach response on an individual computer system?

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the answers listed below refer to the characteristic features of a NIDS? (Select 3 answers)

A

Does not take direct action to block or prevent attacks ( Missed)
Generates alerts and notifies security personnel or administrators when suspicious activity is detected ( Missed)
Monitors network traffic without direct involvement in traffic routing or packet modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following answers refer to a NIPS? (Select 3 answers)

A

Takes proactive measures to block or mitigate intrusion attempts
Operates in an inline mode, actively intercepting and inspecting network traffic
Can drop or reject network packets, terminate connections, or take other actions to stop the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below refers to network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?

A

WIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to network security technology designed to monitor, detect, and mitigate unauthorized access, security threats, and suspicious activities in WLANs?

A

WIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is known as:

A

Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In active-active mode, load balancers distribute network traffic across:

A

All servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In active-passive mode, load balancers distribute network traffic across:

A

Servers marked as active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refers to an IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?

A

IEEE 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, LEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following EAP methods offers the highest level of security?

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A dedicated security solution that filters, monitors, and blocks HTTP/HTTPS traffic between a web application and the Internet is called:

A

WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the answers listed below refers to a firewall type that improves upon first- and second-generation firewalls by offering additional features, such as more in-depth inspection of network traffic and application-level inspection?

A

NGFW

17
Q

Which of the following answers refer to the characteristic features of a Layer 4 firewall? (Select 3 answers)

A

Filters traffic based on source/destination IP addresses, ports, and protocol types (e.g., TCP/UDP) ( Missed)
Offers basic (faster) traffic filtering ( Missed)
Operates at the transport layer of the OSI model

18
Q

Which of the answers listed below refer to a Layer 7 firewall? (Select 3 answers)

A

Offers complex (slower) traffic filtering
Adds the ability to inspect the contents of data packets in addition to the header information
Operates at the application layer of the OSI model

19
Q

Examples of protocols typically used for implementing secure VPN tunnels include: (Select all that apply)

A

IPsec
TLS
L2TP

20
Q

Which of the following terms is used to describe a type of VPN that alleviates bottlenecks and conserves bandwidth by enabling utilization of both the VPN and public network links?

A

Split tunnel

21
Q

Which VPN type is used for connecting computers to a network? (Select 2 answers)

A

Remote access
Client-to-site

22
Q

Which type of VPN enables connectivity between two networks?

A

Site-to-site

23
Q

An HTML5 VPN portal is an example of clientless VPN implementation where an HTML5-compliant web browser along with TLS encryption can be used instead of a dedicated VPN client software.

A

True

24
Q

Which of the answers listed below refers to a hardware or software solution providing secure remote access to networks and resources?

A

RAS

25
Q

Which of the following answers refers to a protocol designed to secure data transmitted over WLANs?

A

WTLS