Networking Chapter 10 Security in Network Design

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What feature of Windows Server allows for agentless authentication? a. AD (Active Directory) b. ACL (access control list) c. IDS (intrusion detection system) d. Network-based firewall

AD (Active Directory)

Active Directory and 389 Directory Server are both compatible with which directory access protocol? a. LDAP b. RADIUS c. Kerberos d. AES

LDAP

Which of the following is not one of the three AAA services provided by RADIUS and TACACS1? a. Authentication b. Authorization c. Access control d. Accounting

access control

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address? a. access-list acl_2 deny tcp any any b. access-list acl_2 permit http any any c. access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www d. access-list acl_2 permit icmp any any

access-list acl_2 permit http any any

What software might be installed on a device in order to authenticate it to the network? a. Operating system b. Security policy c. NAC (network access control) d. Agent

agent

Which NGFW feature allows a network admin to restrict traffic generated by a specific game? a. Content filter b. User awareness c. Context awareness d. Application awareness

application awareness

What kind of firewall blocks traffic based on application data contained within the packets? a. Host-based firewall b. Content-filtering firewall c. Packet-filtering firewall d. Stateless firewall

content-filtering firewall

At what layer of the OSI model do proxy servers operate? a. Layer 3 b. Layer 2 c. Layer 7 d. Layer 4

layer 7

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port? a. mac-limit b. switchport port-security c. storm-control d. shutdown

switchport port-security

Which of the following features is common to both an NGFW and traditional firewalls? a. Application Control b. IDS and/or IPS c. User awareness d. User authentication

user authentication


Set pelajaran terkait

Chapter 13 How Humans Evolved: Physical Anthropology

View Set

Biology Unit 4: When a Bug Gives You the Runs

View Set

Elsevier Adaptive Quizzing for Pediatrics

View Set

Chapter 12: Money Markets, Short-Term Investing and Borrowing

View Set

CIS101 - MyITLab Chapter 6 A computer processor is also known as which of the following?

View Set

Accounting, Exam #4, Ch 12- Ch 14

View Set

Management of Fitness Facilities Exam #2

View Set