Ch. 6 ~ Network Security Flashcards

0
Q

Which of the following is true about subnetting?
A. It requires the use of a Class B network
B. It divides the network IP address on the boundaries between bytes.
C. It provides very limited security protection.
D. It is also called subnet addressing.

A

It is also called subnet addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q
A virtual LAN (VLAN) allows devices to be grouped \_\_\_\_\_\_\_\_\_\_\_\_\_.
A. based on subnets
B. logically 
C. directly to hubs
D. only around core switches
A

Logically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following devices is easiest for an attacker to take advantage of in order to capture and analyze packets?
A. hub
B. switch
C. router
D. load balancer
A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is not an attack against a switch?
A. MAC flooding
B. ARP address impersonation 
C. ARP poisoning 
D. MAC address impersonation
A

ARP address impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not true regarding a demilitarized zone (DMZ)?
A. It provides an extra degree of security
B. It typically includes an email or Web server
C. It can be configured to have one or two firewalls
D. It contains servers that are only used by internal network users

A

It contains servers that are only used by internal network users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A __________ firewall allows the administrator to create sets of related parameters that together define one aspect of the devices operation

A

Settings-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly