Security.5e.Chapter7.Quiz.2017

Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed.

Network

An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?

hub

What kind of networking device forwards packets across different computer networks by reading destination addresses?

router

An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured to make use of both servers in a manner that is transparent to the end users?

Load balancing

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?

Stateful packet filtering

What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?

proxy server

A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:

reverse proxy

What technology enables authorized users to use an unsecured public network, such as the Internet, as if it were a secure private network?

VPN

What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?

Signature

When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?

NAT

Which network address below is not a private IP address network?

172.63.255.0

A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?

Create a DMZ, add necessary hosts.

The IPv4 protocol uses IP addresses which are how many bytes in length?

32

The management in your corporate office want to group users on the network together logically even though they are attached to separate network switches. How can this be done?

Create a VLAN and add the users' computers / ports to the VLAN.

?Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?

Intent

Discuss the two advantages that NAT provides.

One advantage of NAT is the ability to replace private IP address to one public IP address to use.
The second advantage is security a NAT router will know which packets were sent out and what to expect to receive.

Describe how NAC works.

Network Access Protection prevents computers that are infected from joining a network. First, the computer will perform a self-assessment by using SHA which determines it security. Then a Statement of Health is sent to the server which is the Health regis

What is a VLAN? How is a VLAN created?

VLAN is the method use to segment networks by separating devices into logical groups. A VLAN is created by either using the port they are connected to or the MAC address of the device. By doing this scatter users can be group together even if they are phy