Created by Odin D.
over 6 years ago
|
||
Which secure feature does a load balancer NOT provide?
Which of these would NOT be a filtering mechanism found in a firewall rule?
A(n) _____________ can identity the application that send packets and then make decisions about filtering based on it.
Which function does an Internet content filter NOT perform?
How does network address translation (NAT) improve security?
How does a virtual LAN (VLAN) allow devices to be grouped?
Which device is easiest for an attacker to take advantage of in order to capture and analyze packets?
Which of these is NOT an attack against a switch?
Which statement regarding a demilitarized zone (DMZ) is NOT true?
Which statement about network address translation (NAT) is true?
Which of these is NOT an advantage of a load balancer?
A(n) _________ intercepts internal user requests and then processes those requests on behalf of the users.
A reverse proxy __________.
Which is the preferred location for installation of a spam filter?
A _______ watches for attacks and sounds an alert only when one occurs.
A multipurpose security device is known as __________.
Each of these can be used to hide information about the internal network EXCEPT ________.
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
If a device is determined to have an out-of-date virus signature file, then Network Access Control (NAC) can redirect that device to a network by __________.
A firewall using __________ is the most secure type of firewall.