Module 4 IT Fundamentals

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

To capture network transmissions

For what purpose is a network sniffer used?

Sniffing

Monitoring network communications to collect information about the network and collect the content of the network packets is known as:

Windows updates, firewalls, spyware, and antivirus protections

Network Access Protection (NAP) is able to check the status of:

Stateful inspection

Which firewall inspection method logs outgoing connections and checks incoming traffic against that log?

Stateful software firewall

Windows firewall is a:

Honeypot

A computer that is designed to entice hackers to attack is known as a:

To allow corporate users to securely access your internal network from a remote location

For what purposes would you use a VPN?

To provide protection for an individual client

In which situation would you use a Class 1 firewall?

Are configured from software included with the operating system

Software firewalls:

A NAP healthy policy server

To deploy Network Access Protection (NAP), you must have:

Encapsulates packets of one protocol inside another protocol

Tunneling:

To protect the network by restricting incoming and outgoing network traffic

What is the primary purpose of a firewall?

Source and destination IP addresses

What kind of data does a stateless firewall use to determine which network frames to allow or block?

Validating and requesting a health certificate for compliant clients

Which is the role of a Health Registration Authority (HRA) in Network Access Protection (NAP)?

A honeypot

Which is used for the sole purpose of Intrusion detection?

A Firewall

Which is used to implement packet filtering of packets sent from and received on the network?

Digital signature

Which is used to validate DNSSEC responses?

ESP

Which of the following is an IPsec protocol that provides data confidentiality in addition to authentication?

DNSSEC

Which uses digital signatures to provide security for DNS communications and helps minimize the likelihood of man-in-the-middle attacks?

encrypting data transmitted over the network

Which would reduce the likelihood of a sniffer attack?

DNSSEC

You are a network administrator for your organization. The corporate help deck receive several customer complaints that visits to your organization's public website redirected them to a known malware site. You need to mitigate this type of network attack. Which technology should you implement?

Group Policy settings

You are setting up a server isolation in an Active Directory domain to limit access to select domain members only. You will need to configure:

Windows Vista, Windows 7, Windows XP SP3 or later.

You have a server running Windows Server 2008. You want to deploy NAP to enforce compliance for client computers on the network. Which client operating systems are supported?

DMZ

You have a web server on your network that will be Internet facing. You need to allow external users to access the Web server, but protect the internal network. What should you use?

NAP

You need to ensure that only specific computers are allowed to access specific network resources. What should you use?

Virtual local area network (VLAN)

You want to configure clients and servers in different geographic locations on your network as if they were all part of the same subset. You need to set up a:

A perimeter network

You want to provide public access to a Web server. Visitors to the Web server should not have access to your internal network. You need to configure:

Apply Windows XP SP3

Your network includes several client computers running Windows XP Service Pack (SP) 2. Which action must you take (at minimum) before the clients can be made Network Access Protection (NAP) compliant?


संबंधित स्टडी सेट्स

BJU World History: Chapter 10- The Reshaping of Medieval Europe

View Set

American Indians on the East Coast Guided Reading Key

View Set