ITSY 1300 Final Test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

Application proxying

A packet-filtering firewall remembers information about the status of a network communication.

False

IP addresses are eight-byte addresses that uniquely identify every device on the network.

False

Implicit deny is when firewalls look at message addresses to determine whether a message is being sent around an unending loop.

False

David would like to connect a fibre channel storage device to systems over a standard data network. What protocol can he use?

Fibre Channel over Ethernet (FCoE)

What type of firewall security feature limits the volume of traffic from individual hosts?

Flood guard

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working?

Presentation

What firewall approach is shown in the figure?

Screened subnet

Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?

Smurf

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows?

Switch

A network attacker wants to know IP addresses used on a network, remote access procedures, and weaknesses in network systems.

True

Internet Small Computer System Interface (iSCSI) is a storage networking standard used to link data storage devices to networks using IP for its transport layer.

True

The Physical Layer of the OSI Reference Model must translate the binary ones and zeros of computer language into the language of the transport medium.

True

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?

Virtual LAN (VLAN)

Gary is configuring a Smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity?

Wi-Fi


Ensembles d'études connexes

BT1 - Final Exam [Chapter 1 - Chapter 5]

View Set

Define the terms culture and cultural norms (SAQ)

View Set

Writing and Graphing Equations in Two Variables

View Set

FIN205 Topic 7: Valuation of intangible assets

View Set