CTC 452 Quiz 7
DDos
In what type of attack are zombies usually put to use?
three-pronged firewall
What do you call a firewall that is connected to the Internet, the internal network, and the DMZ?
ensure all security patches are installed
What is a critical step you should take on the OS you choose for a bastion host?
Honeypot
What is the term used for a computer placed on the network perimeter that is meant to attract attackers?
reverse firewall
What should you consider installing if you want to inspect packets as they leave the network?
out of band
Where should network management systems generally be placed?
proxy server
Which network device works at the Application layer by reconstructing packets and forwarding them to Web servers?
a subnet of publicly accessible servers placed outside the internal network
Which of the following best describes a DMZ?
load-balancing software
Which of the following is best described as software that prioritizes and schedules requests and then distributes them to servers based on each server's current load and processing power.
serves as a single point of entry to the network
Which of the following is true about a dual-homed host?
it should be combined with a firewall for better security
Which of the following is true about a screening router?
they are not routable on the Internet
Which of the following is true about private IP addresses?
one -to-one NAT
Which type of NAT is typically used on devices in the DMZ?
screened subnet DMZ
Which type of firewall configuration protects public servers by isolating them from the internal network?
proxy server
Which type of security device can speed up Web page retrieval and shield hosts on the internal network?