Quiz: Module 11 Security in Network Design

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?

Application data

Which device would allow an attacker to make network clients use an illegitimate default gateway?

DHCP server

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP

At what layer of the OSI model do proxy servers operate?

Layer 7

Who is responsible for the security of hardware on which a public cloud runs?

The cloud provider

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit https any any

Which of the following is not one of the AAA services provided by RADIUS and TACACS+?

Administration

Which policy ensures messages are discarded when they don't match a specific firewall rule?

Implicit deny

Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?

Separation of duties

What information in a transmitted message might an IDS use to identify network threats?

Signature


Set pelajaran terkait

chapter 1: creating a worksheet and charting data

View Set

Chapter 14 Workers' Compensation Insurance

View Set

Chapter 4: Evaluation a Company's Resources, Capabilities and Competitiveness

View Set

DBU Principles of Management Final Exam

View Set

SLS-1261 M2A3 Quiz | Chapters 5 and 6

View Set

Network Security 4.1 , 4.2, and 4.3 Quiz

View Set

Chapter 19: Documenting and Reporting

View Set