The Basic LAN Flashcards

1
Q

Which one of the following types of filtering is used to control traffic entering a network?

Egress filtering

Ingress filtering

Implicit deny

A

Ingress filtering

Ingress filtering is used to control traffic entering a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which network device is used to send traffic to different physical networks, based upon logical addressing?

Router

Switch

Load balancer

A

Router

A router is used to send traffic to different physical networks, based upon logical addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of device is used to provide network protection and security by preventing hosts from connecting to the organization’s infrastructure unless they meet certain criteria?

NAT device

Firewall

NAC device

A

NAC device

A Network Access Control (NAC) device is used to provide network protection and security by preventing hosts from connecting to the organization’s infrastructure unless they meet certain criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

All the following characteristics describe VLANs, except:

VLANs separate hosts into logical networks.

VLANs can be used to apply security policies and filtering to different segments.

VLANs allow any host plugged into the switch to become a member of the virtual segment.

A

VLANs allow any host plugged into the switch to become a member of the virtual segment.

VLANs do not allow any hosts plugged into the switch to automatically become a member of the virtual segment; membership is based upon switch port, MAC address, or IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following would be needed to block excessive traffic from a particular protocol?

Flood guard

Loop protection

ACL

A

Flood guard

A flood guard is used to block excessive traffic from a particular protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following describes a network device that intercepts user or host requests and then makes those requests to other hosts or networks on behalf of the user?

Proxy

Firewall

NIDS

A

Proxy

A proxy is a network device that intercepts user or host requests and then makes those requests to other hosts or networks on behalf of the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following types of connections does a VPN concentrator control? (Choose two.)

Device VPN

Client VPN

User VPN

Site-to-site VPN

A

Client VPN

Site-to-site VPN

A VPN concentrator manages connections for both client and site-to-site VPN connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A NIPS is considered a __________ type of control.

detective

preventative

network

A

preventative

A network intrusion prevention system (NIPS) is considered a preventative type of control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following terms refers to combination of multifunction security devices?

Application firewall

Web security gateway

Unified Threat Management

A

Unified Threat Management

Unified Threat Management refers to a combination of multifunction security devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following does an application firewall focus on for traffic filtering?

Traffic content

Protocol and port

Source or destination IP address

A

Traffic content

An application firewall focuses on traffic content for filtering, rather than on traffic characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly