Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/20

Click to flip

20 Cards in this Set

  • Front
  • Back
Which of the following security mechanisms prevents unauthorized network access via the Internet and isolates LAN-to-LAN access within a private network?
A firewall
What are the three main firewall methods you can use to examine network traffic and detect potential threats? Choose three correct answers.
Stateful packet filtering
Proxy server
Packet filtering
Which of the following statements about packet filtering firewalls are true? Choose all answers that are correct.
- Filtering criteria are based on data-link and network layer addresses, network protocols, and transport layer ports.
- Packets that do not meet the filter criteria are silently discarded.
Which Microsoft product enables a computer running Microsoft Windows 2000 Server or Microsoft Windows Server 2003 that is functioning as a router to provide packet filtering firewall services?
Routing and Remote Access Service (RRAS)
What Novell product enables a NetWare server that is functioning as a router to provide firewall and Network Address Translation (NAT) services?
BorderManager
What are the two main drawbacks associated with packet filtering firewalls? Choose two correct answers.
They cannot protect a network against specific attack code embedded within a packet?s application data.
- Packet filtering requires an extensive understanding of Transmission Control Protocol/Internet Protocol (TCP/IP) and other networking protocols in order to effectively and successfully use it.
Which of the following statements about stateful packet filtering are not true? Choose all answers that are correct.
- Routers examine incoming packets and only forward packets based on protocol and port information.
- Routers examine incoming packets and forward the packets that pass the criteria defined in filters, whether or not they are listed in the router?s state table.
Which of the following Network Address Translation (NAT) implementations requires the same number of registered and unregistered Internet Protocol (IP) addresses?
Static
Which of the following Network Address Translation (NAT) implementations maps multiple private Internet Protocol (IP) addresses to one or more public addresses and uses transport layer ports for uniqueness?
Masquerading
Which of the following are Network Address Translation (NAT) implementations? Choose all answers that are correct.
Static
Masquerading
Which of the following statements about proxy servers are true? Choose all answers that are correct.
Proxy servers operate at the application layer of the OSI model.
- Proxy servers act as an intermediary between clients and servers.
- Proxy servers never permit a connection to be directly established between a client on a private network and an Internet host.
- Proxy servers can examine and filter packets based on all protocol headers and application data contained within the packet.
Which of the following types of information can a proxy server base its filtering decision on? Choose all answers that are correct.
- Specific types of e-mail attachments
- The name and Internet Protocol (IP) address of Web sites that are permitted or denied
Which of the following protocols secure a data network for transmission of information? Choose all answers that are correct.
IP Security (IPSec)
Layer 2 Tunneling Protocol (L2TP)
Kerberos
Secure Sockets Layer (SSL)
Identify the service that is not provided by the IP Security (IPSec) Authentication Header (AH)header protocol?
Data encryption
What two modes does IP Security (IPSec) support?
Tunnel
Transport
Which data storage technology consists of two identical disk drives connected to a single host adapter with identical data stored on each drive?
Mirroring
What redundant array of independent disks (RAID) level increases the speed of write requests by writing data to multiple disks, but does not provide any fault tolerance against disk failures?
0
What data storage technology consists of a drive array with an embedded operating system that connects directly to a local area network (LAN)?
NAS
Which of the following are the three most common backup methods? Choose three answers that are correct.
Incremental
Full
Differential
Which of the following backup methods clear the archive bit upon completion? Choose all answers that are correct.
Incremental
Full