Security+ Network Security Fundamentals Chapter 7 – Flashcards
Unlock all answers in this set
Unlock answersquestion
False
answer
The OSI model breaks networking steps down into a series of six layers.
question
True
answer
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
question
True
answer
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
question
False
answer
Workgroup switches must work faster than core switches.
question
True
answer
Defense in depth, or layered security, involves the use of multiple types of network hardware within a network.
question
Session
answer
What layer of the OSI model is responsible for permitting two parties on a network to hold ongoing communications across the network?
question
Network
answer
Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed.
question
hub
answer
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?
question
router
answer
What kind of networking device forwards packets across different computer networks by reading destination addresses?
question
Load balancing
answer
An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured to make use of both servers in a manner that is transparent to the end users?
question
Stateful packet filtering
answer
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?
question
proxy server
answer
What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
question
reverse proxy
answer
A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:
question
VPN
answer
What technology enables authorized users to use an unsecured public network, such as the Internet, as if were a secure private network?
question
Web security gateway
answer
Select below the technology that can be used to examine content through application-level filtering:
question
Signature
answer
What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
question
system call
answer
What is the name for an instruction that interrupts a program being executed and requests a service from the operating system?
question
NAT
answer
When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?
question
172.63.255.0
answer
Which network address below is not a private IP address network?
question
Create a DMZ, add necessary hosts.
answer
A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?
question
4
answer
The standard TCP/IP protocol uses IP addresses which are how many bytes in length?
question
802.1Q
answer
What vendor neutral protocol implements support for VLAN tagging?
question
Create a VLAN and add the users' computers / ports to the VLAN.
answer
The management in your corporate office want to group users on the network together logically even though they are attached to separate network switches. How can this be done?
question
Intent
answer
Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?
question
Layer 4
answer
A load balancer that works with the File Transfer Protocol is operating at what layer of the OSI model?
question
content
answer
Internet ____________________ filters monitor Internet traffic and block access to pre-selected Web sites and files.
question
Network address translation (NAT)
answer
_________________ is a technique that allows a private IP addresses to be used on the Internet with a single public IP address.
question
switch
answer
A network _________________ isolates connected devices by learning MAC addresses and only sending frames intended for specific MAC addresses to the ports they're connected to, unless the MAC address is unknown.
question
telecommuter
answer
A ______________ is a worker who work occasionally or regularly from a home office.
question
protocol analyzer
answer
The traffic sent by devices connected to a hub can be captured and decoded by a _________________.