WAN connectivity Flashcards

1
Q

Which of the following network devices restricts traffic based on words, signatures, and URLs?

A

Content filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IEEE protocol is used with VLAN technology?

A

802.1q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following network appliances will only detect and not prevent malicious network activity?

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements best applies to an IDS?

A

An Intrusion Detection System (IDS) is a security system that monitors network traffic for signs of malicious activity or policy violations and generates alerts or reports to a designated user or security administrator. Unlike an Intrusion Prevention System (IPS), an IDS does not actively prevent or respond to detected intrusions, but instead provides information that can be used to investigate and respond to security incidents. IDS can inspect a copy of all network traffic or a subset of traffic based on pre-defined rules or signatures to identify potential security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A static VLAN assigns VLANs to _______________.

A

ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not a tunneling protocol?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A VLAN with a gateway offers no security without the addition of:

A

An ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is the trunking protocol used in today’s VLANs?

A

802.1Q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which VPN technology enables direct connections between satellite locations?

A

DMVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

802.1X is a great example of _______________.

A

port authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly