1601 Quiz 10 Information Security Fundamentals

¡Supera tus tareas y exámenes ahora con Quizwiz!

Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

Application proxying

Karen would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?

Captive portal

IP addresses are eight-byte addresses that uniquely identify every device on the network.

False

Internet Control Message Protocol (ICMP) is a method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address.

False

David would like to connect a fibre channel storage device to systems over a standard data network. What protocol can he use?

Fibre Channel over Ethernet (FCoE)

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows?

Switch

A network attacker wants to know IP addresses used on a network, remote access procedures, and weaknesses in network systems.

True

Internet Small Computer System Interface (iSCSI) is a storage networking standard used to link data storage devices to networks using IP for its transport layer.

True

Network access control (NAC) works on wired and wireless networks.

True

The Data Link Layer of the OSI Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).

True

The OSI Reference Model is a theoretical model of networking with interchangeable layers.

True

The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

The three main categories of network security risk are reconnaissance, eavesdropping, and denial of service.

True

Gary is configuring a Smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity?

Wi-Fi

What wireless security technology contains significant flaws and should never be used?

Wired Equivalent Privacy (WEP)


Conjuntos de estudio relacionados

RN 31 Ch 39 PrepU Fluid, Electrolyte, Acid-Base Balance

View Set

Health and Wellness and Health Promotion EAQ

View Set

Cognitive Psychology Exam Qs Ch. 9, 12, 13

View Set

Monopolistic Competition & Oligopoly

View Set

American Civil Liberties: cases : Part 5

View Set