Filters
Question type

Study Flashcards

The OSI model breaks networking steps down into a series of six layers.

A) True
B) False

Correct Answer

verifed

verified

A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.


A) proxy server
B) DNS server
C) VPN server
D) telnet server

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Workgroup switches must work faster than core switches.

A) True
B) False

Correct Answer

verifed

verified

Layer 5 of the OSI model is the ____ layer.


A) Network
B) Data Link
C) Session
D) Presentation

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A(n) ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.


A) application gateway
B) security proxy
C) Web security gateway
D) firewall

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

____ provides remote users with the same access and functionality as local users through a VPN or dial-up connection.


A) Extranet
B) Remote access
C) Intranet
D) Virtual access

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

B

____ is a technology that can help to evenly distribute work across a network.


A) Stateful packet filtering
B) Load balancing
C) DNS caching
D) DNS poisoning

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

IP addresses are ____-bit addresses.


A) 4
B) 8
C) 16
D) 32

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

List and describe two advantages of a proxy server.

Correct Answer

verifed

verified

Increased speed - because proxy servers ...

View Answer

What are the two TCP/IP protocols used by e-mail systems to send and receive messages?

Correct Answer

verifed

verified

E-mail systems use two TCP/IP protocols ...

View Answer

Describe all-in-one network security appliances.

Correct Answer

verifed

verified

Because of the different types of networ...

View Answer

Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.

A) True
B) False

Correct Answer

verifed

verified

____ is a technique that allows private IP addresses to be used on the public Internet.


A) PAT
B) PNAT
C) NAPT
D) NAT

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

A basic level of security can be achieved through using the security features found in network hardware.

A) True
B) False

Correct Answer

verifed

verified

____ IP addresses are IP addresses that are not assigned to any specific user or organization.


A) Public
B) Private
C) Public domain
D) Private domain

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

B

A ____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.


A) switch
B) router
C) firewall
D) hub

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

D

A ____ allows scattered users to be logically grouped together even though they may be attached to different switches.


A) subnet
B) broadcast domain
C) DMZ
D) VLAN

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Each operation in a computing environment starts with a ____.


A) system call
B) unit call
C) hardware instruction
D) system exception

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

List and describe three advantages to subnetting.

Correct Answer

verifed

verified

Decreased network traffic - broadcasts t...

View Answer

Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.

Correct Answer

verifed

verified

Showing 1 - 20 of 42

Related Exams

Show Answer