Filters
Question type

Study Flashcards

Which network address below is not a private IP address network?


A) 10.4.5.0
B) 172.63.255.0
C) 192.168.255.0
D) 172.17.16.0

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

What dedicated hardware device aggregates hundreds or thousands of VPN connections?


A) VPN server
B) VPN gateway
C) VPN switch
D) VPN concentrator

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Describe how VLAN communication takes place.

Correct Answer

verifed

verified

VLAN communication can take place in two...

View Answer

Describe how a mail gateway operates?

Correct Answer

verifed

verified

A mail gateway monitors emails for unwan...

View Answer

Describe how Network Access Control (NAC)works.

Correct Answer

verifed

verified

NAC examines the current state of a syst...

View Answer

What type of network is a private network that can also be accessed by authorized external customers,vendors,and partners?


A) extranet
B) intranet
C) enterprise network
D) guest network

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What type of dedicated cryptographic processor that provides protection for cryptographic keys?


A) SSL/TLS accelerator
B) media gateway
C) SSL decryptor
D) hardware security module

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?


A) forward proxy server
B) DNS server
C) VPN server
D) telnet server

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network?


A) network access control
B) virtual LANs
C) network address translation
D) host health checks

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?


A) Stateful frame filtering
B) Stateless frame filtering
C) Stateful packet filtering
D) Stateless packet filtering

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What technology enables authorized users to use an unsecured public network,such as the Internet as if it were a secure private network?


A) IKE tunnel
B) VPN
C) endpoint
D) router

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?


A) extranet
B) intranet
C) enterprise network
D) guest network

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?

Correct Answer

verifed

verified

The Post Office Prot...

View Answer

Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?


A) forward proxy
B) application proxy
C) system proxy
D) reverse proxy

E) None of the above
F) All of the above

Correct Answer

verifed

verified

One use of data loss prevention (DLP)is blocking the copying of files to a USB flash drive.

A) True
B) False

Correct Answer

verifed

verified

What term is used to describe the software agents that are used by NAC and installed on devices to gather information?


A) NAC check agents
B) server health agents
C) host agent health checks
D) network health agents

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

An intranet is a separate open network that anyone can access without prior authorization.

A) True
B) False

Correct Answer

verifed

verified

An agent may be a permanent NAC agent and reside on end devices until uninstalled,but it cannot be a dissolvable NAC agent.

A) True
B) False

Correct Answer

verifed

verified

What vendor neutral protocol implements support for VLAN tagging?


A) ISL
B) VTP
C) 802.1Q
D) VSTP

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Anomaly monitoring is designed for detecting statistical anomalies.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer