Quiz 9 Coms System Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

What type of firewall security feature limits the volume of traffic from individual hosts?

Flood guard

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?

Hub

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working?

Presentation

The OSI Reference Model is a theoretical model of networking with interchangeable layers.

True

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?

VPN concentrator

Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

Application proxying

What protocol is responsible for assigning IP addresses to hosts on most networks?

Dynamic Host Configuration Protocol (DHCP)

Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?

Smurf

What wireless security technology contains significant flaws and should never be used?

Wired Equivalent Privacy (WEP)

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?

Virtual LAN (VLAN)


Conjuntos de estudio relacionados

Computer Software - Application Software

View Set

Ch. 17 Fluid and electrolyte imbalance

View Set

Unit 24 - Insurance Based Products

View Set

PrepU Query Quiz: Perfusion: Shock

View Set

Elements of Effective Communication C132

View Set

Topic 3 - Federal Fair Housing Laws

View Set

Chapter 20: Seizing an American Empire, 1865-1913

View Set