WAN connectivity Flashcards
Which of the following network devices restricts traffic based on words, signatures, and URLs?
Content filter
Which IEEE protocol is used with VLAN technology?
802.1q
Which of the following network appliances will only detect and not prevent malicious network activity?
IDS
Which of the following statements best applies to an IDS?
An Intrusion Detection System (IDS) is a security system that monitors network traffic for signs of malicious activity or policy violations and generates alerts or reports to a designated user or security administrator. Unlike an Intrusion Prevention System (IPS), an IDS does not actively prevent or respond to detected intrusions, but instead provides information that can be used to investigate and respond to security incidents. IDS can inspect a copy of all network traffic or a subset of traffic based on pre-defined rules or signatures to identify potential security threats.
A static VLAN assigns VLANs to _______________.
ports
Which of the following is not a tunneling protocol?
WEP
A VLAN with a gateway offers no security without the addition of:
An ACL.
Which of the following is the trunking protocol used in today’s VLANs?
802.1Q
Which VPN technology enables direct connections between satellite locations?
DMVPN
802.1X is a great example of _______________.
port authentication