Final Exam - Chapter 11
A(n) ________ is an isolated part of a network that is connected both to the Internet and your internal secure network and is a common home for Internet-facing Web servers.
Demilitarized zone (DMZ)
The ________ feature speeds up routing network packets by adding a label to each packet with routing information.
Multi-protocol label switching (MPLS)
A(n) ________ makes requests for remote services on behalf of local clients.
Proxy server
If you only have one connection to the Internet and that connection fails, your organization loses its Internet connection. This is an example of a(n) ________.
Single point of failure
Many organizations use a(n) ________ to allow remote users to connect to internal network resources.
Virtual private network
Which type of network device is most commonly used to filter network traffic? A. Router B. Firewall C. Switch D. IDS
B
You only need written authorization prior to conducting a penetration test that accesses resources outside your organization. A. True B. False
B
Which of the following devices detect potential intrusions? (Select two.) A. Firewall B. IPS C. IDS D. Load balancer
B and C
A distributed application is one in which the components that make up the application reside on different computers. A. True B. False
A
NAT is helpful to hide internal IP addresses from the outside world. A. True B. False
A
Which of the following best describes the term honeypot? A. A server that is deliberately set up in an unsecure manner to attract attackers B. A server that contains extremely sensitive data C. A collection of computers that are vulnerable to attack and could allow your network to be compromised D. Vulnerable servers in your network that would not be dangerous if compromised
A
Which of the following is a solution that defines and implements a policy that describes the requirements to access your network? A. NAC B. NAT C. NIC D. NOP
A
Which of the following is commonly the primary security control for data entering the LAN-to-WAN Domain? A. Filtering B. NAT C. Encryption D. Address validation
A
What does it mean when there are differences between the last security configuration baseline and the current security configuration settings? A. Unauthorized changes have occurred. B. Authorized changes have occurred. C. Changes have occurred (either authorized or unauthorized). D. Unapproved changes are awaiting deployment.
C
Which of the following best describes a dual-homed ISP connection? A. An ISP connection using two firewalls B. Connecting two LANs to the Internet using a single ISP connection C. A network that maintains two ISP connections D. Using two routers to split a single ISP connection into two subnets
C