Filters
Question type

Study Flashcards

What type of network is a private network that can also be accessed by authorized external customers,vendors,and partners?


A) extranet
B) intranet
C) enterprise network
D) guest network

Correct Answer

verifed

verified

What dedicated hardware device aggregates hundreds or thousands of VPN connections?


A) VPN server
B) VPN gateway
C) VPN switch
D) VPN concentrator

Correct Answer

verifed

verified

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?


A) Stateful frame filtering
B) Stateless frame filtering
C) Stateful packet filtering
D) Stateless packet filtering

Correct Answer

verifed

verified

Describe how VLAN communication takes place.

Correct Answer

verifed

verified

VLAN communication can take place in two...

View Answer

One use of data loss prevention (DLP)is blocking the copying of files to a USB flash drive.

Correct Answer

verifed

verified

What type of dedicated cryptographic processor that provides protection for cryptographic keys?


A) SSL/TLS accelerator
B) media gateway
C) SSL decryptor
D) hardware security module

Correct Answer

verifed

verified

What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network?


A) network access control
B) virtual LANs
C) network address translation
D) host health checks

Correct Answer

verifed

verified

What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?

Correct Answer

verifed

verified

The Post Office Prot...

View Answer

What term is used to describe the software agents that are used by NAC and installed on devices to gather information?


A) NAC check agents
B) server health agents
C) host agent health checks
D) network health agents

Correct Answer

verifed

verified

Describe how a mail gateway operates?

Correct Answer

verifed

verified

A mail gateway monitors emails for unwan...

View Answer

What technology enables authorized users to use an unsecured public network,such as the Internet as if it were a secure private network?


A) IKE tunnel
B) VPN
C) endpoint
D) router

Correct Answer

verifed

verified

Describe how Network Access Control (NAC)works.

Correct Answer

verifed

verified

NAC examines the current state of a syst...

View Answer

An intranet is a separate open network that anyone can access without prior authorization.

Correct Answer

verifed

verified

What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?


A) extranet
B) intranet
C) enterprise network
D) guest network

Correct Answer

verifed

verified

Anomaly monitoring is designed for detecting statistical anomalies.

Correct Answer

verifed

verified

What vendor neutral protocol implements support for VLAN tagging?


A) ISL
B) VTP
C) 802.1Q
D) VSTP

Correct Answer

verifed

verified

An agent may be a permanent NAC agent and reside on end devices until uninstalled,but it cannot be a dissolvable NAC agent.

Correct Answer

verifed

verified

Which network address below is not a private IP address network?


A) 10.4.5.0
B) 172.63.255.0
C) 192.168.255.0
D) 172.17.16.0

Correct Answer

verifed

verified

What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?


A) forward proxy server
B) DNS server
C) VPN server
D) telnet server

Correct Answer

verifed

verified

Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?


A) forward proxy
B) application proxy
C) system proxy
D) reverse proxy

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer