Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which of the following security mechanisms prevents unauthorized network access via the Internet and isolates LAN-to-LAN access within a private network?
|
A firewall
|
|
What are the three main firewall methods you can use to examine network traffic and detect potential threats? Choose three correct answers.
|
Stateful packet filtering
Proxy server Packet filtering |
|
Which of the following statements about packet filtering firewalls are true? Choose all answers that are correct.
|
- Filtering criteria are based on data-link and network layer addresses, network protocols, and transport layer ports.
- Packets that do not meet the filter criteria are silently discarded. |
|
Which Microsoft product enables a computer running Microsoft Windows 2000 Server or Microsoft Windows Server 2003 that is functioning as a router to provide packet filtering firewall services?
|
Routing and Remote Access Service (RRAS)
|
|
What Novell product enables a NetWare server that is functioning as a router to provide firewall and Network Address Translation (NAT) services?
|
BorderManager
|
|
What are the two main drawbacks associated with packet filtering firewalls? Choose two correct answers.
|
They cannot protect a network against specific attack code embedded within a packet?s application data.
- Packet filtering requires an extensive understanding of Transmission Control Protocol/Internet Protocol (TCP/IP) and other networking protocols in order to effectively and successfully use it. |
|
Which of the following statements about stateful packet filtering are not true? Choose all answers that are correct.
|
- Routers examine incoming packets and only forward packets based on protocol and port information.
- Routers examine incoming packets and forward the packets that pass the criteria defined in filters, whether or not they are listed in the router?s state table. |
|
Which of the following Network Address Translation (NAT) implementations requires the same number of registered and unregistered Internet Protocol (IP) addresses?
|
Static
|
|
Which of the following Network Address Translation (NAT) implementations maps multiple private Internet Protocol (IP) addresses to one or more public addresses and uses transport layer ports for uniqueness?
|
Masquerading
|
|
Which of the following are Network Address Translation (NAT) implementations? Choose all answers that are correct.
|
Static
Masquerading |
|
Which of the following statements about proxy servers are true? Choose all answers that are correct.
|
Proxy servers operate at the application layer of the OSI model.
- Proxy servers act as an intermediary between clients and servers. - Proxy servers never permit a connection to be directly established between a client on a private network and an Internet host. - Proxy servers can examine and filter packets based on all protocol headers and application data contained within the packet. |
|
Which of the following types of information can a proxy server base its filtering decision on? Choose all answers that are correct.
|
- Specific types of e-mail attachments
- The name and Internet Protocol (IP) address of Web sites that are permitted or denied |
|
Which of the following protocols secure a data network for transmission of information? Choose all answers that are correct.
|
IP Security (IPSec)
Layer 2 Tunneling Protocol (L2TP) Kerberos Secure Sockets Layer (SSL) |
|
Identify the service that is not provided by the IP Security (IPSec) Authentication Header (AH)header protocol?
|
Data encryption
|
|
What two modes does IP Security (IPSec) support?
|
Tunnel
Transport |
|
Which data storage technology consists of two identical disk drives connected to a single host adapter with identical data stored on each drive?
|
Mirroring
|
|
What redundant array of independent disks (RAID) level increases the speed of write requests by writing data to multiple disks, but does not provide any fault tolerance against disk failures?
|
0
|
|
What data storage technology consists of a drive array with an embedded operating system that connects directly to a local area network (LAN)?
|
NAS
|
|
Which of the following are the three most common backup methods? Choose three answers that are correct.
|
Incremental
Full Differential |
|
Which of the following backup methods clear the archive bit upon completion? Choose all answers that are correct.
|
Incremental
Full |