Security+ Ch03
You desire a product that has the ability to detect a distributed denial of service attack on your network and take an action to stop the attack. Which type of product does this describe?
NIPS
How many bits are used for addressing with IPv6?
128
What TCP port does SSH use?
22
The FTP protocol functions at which layer of the TCP/IP model?
Application
Servers or computers that have two NIC cards, each connected to separate networks, are known as what type of computers?
Dual-homed
Which of the following devices are the first line of defense for networks connected to the Internet?
Firewalls
You desire a software product that will monitor a server and detect abnormal conditions such as services starting that are not part of the baseline configuration. You want the software product to send you an alert if it detects an abnormal condition but not take an action. Which type of product does this describe?
HIDS
IPv6 has mandatory requirements built-in for which security protocol?
IPSec
Which of the following remote access protocol should not be selected for a WAN VPN connection due to lack of security features?
PPP
Which of the following types of firewalls will pass or block packets based on their application or TCP port number.
Packet filter
If you wanted to connect two private networks securely over the Internet, what type of technology could you use?
VPN
In TCP/IP parlance, any computer or device with an IP address on a TCP/IP network is known as a(n):
host