3.2

Ace your homework & exams now with Quizwiz!

The IT department has been given a new project to move to a virtual infrastructure to better utilize infrastructure and to deploy business solutions rapidly. What is the name for the type of technology described in this project?

Software-defined networking (SDN)

A security manager has been tasked with finding a solution for remote users to be able to connect to the corporate network securely. The solution must also support at least 500 simultaneous users. Which solution does the manager decide to implement on the network?

A virtual private network (VPN) concentrator

To help secure their corporate network, the security administrator and the network administrator have banned which type of network inside corporate walls?

Ad hoc

The network administrator at a medium-sized company wants to increase bandwidth between servers in the corporate data center. Which type of equipment does the administrator select to attain this goal?

Aggregation switches

A security administrator has decided to implement virtual local area networks (VLANs) on the network to segregate traffic into zones. Which network topology is not segregated by a VLAN?

Air gap

A security administrator needs to set up a completely isolated network with no Internet access for secret projects. Which of the following topologies gives the administrator the absolute protection required?

Air gap

A security administrator wants to tap the internal network with a sensor to capture suspected malicious data. Where does the administrator place the network tap or sensor device?

Alongside end-user switches

You are reviewing the recommendations sent by the network architecture team for securing corporate users and web servers from external threats. Which of the following architecture is the most secure adaptation that can be approved?

Internet > Firewall > Web Server > Firewall > Internal Network

Which of the following network topologies is the most secure for corporate users?

Intranet

A group of web developers has built a new multi-tier web application that must run on multiple servers to maintain constant uptime and to mitigate distributed denial of service (DDoS) attacks. Which solution will allow multiple servers to serve a single application without the fear of downtime if one server system fails?

Load balancer

Secure Sockets Layer (SSL) accelerator services are often combined with what other network appliance?

Load balancers

A network administrator collaborates with the security department to create an internal network that is relatively hidden from the Internet. They accomplish this by only exposing a single Internet Protocol (IP) address through which many corporate users can browse. Which security implementation makes this possible?

Network address translation (NAT)

The security manager has purchased a security information and event management (SIEM) tool to provide near-real-time analysis of security alerts generated by network hardware and applications. The security manager wants the security team to place it in the demilitarized zone (DMZ) to capture data. Why is the DMZ a poor choice for placing the SIEM tool?

The DMZ directly exposes the SIEM tool to the Internet.

A junior-level security administrator places a network proxy and filter alongside an end-user switch in order to protect the internal network. What is the problem with this placement?

The network proxy and filter needs to be placed near the network perimeter.

Why does a security team implement a remote access virtual private network (VPN)?

To provide users a secure method of connecting to the corporate network

A security administrator needs to set up a honeynet to avoid allowing hackers to compromise servers on the corporate network. Which of the following does the administrator implement to protect the corporate network?

Virtual local area network (VLAN)

The security team wants to connect multiple remote offices with the central office, but standard, dedicated telephone company circuits are very expensive. Which solution does the security team implement to connect their remote offices in a secure and inexpensive manner?

Virtual private network (VPN)


Related study sets

Science 9 Planets In Our Solar System

View Set

10.1 The Beginnings of Modern Iran

View Set

Ch 3: The Accounting Cycle: End of the Period

View Set

13.4 Ageism Theoretical Perspective

View Set

chapter 11 - corporate performance, governance, and business

View Set