Chapter 6 Review Question Answers
- Which of the following is true about subnetting?
- It requires the use of a Class B network.
- It divides the network IP address on the boundaries between bytes.
- It provides very limited security protection.
- Itis also called subnet addressing.
- A virtual LAN (VLAN) allows devices to be grouped ______.
- based on subnets
- logically
- directly to hubs
- only around core switches
- Which of the following devices is easiest for an attacker to take advantage of in order to capture and analyze packets?
- hub
- switch
- router
- load balancer
- Which of the following is not an attack against a switch?
- MAC flooding
- ARP address impersonation
- ARP poisoning
- MAC address impersonation
- Which of the following is not true regarding a demilitarized zone (DMZ)?
- It provides an extra degree of security.
- It typically includes an e-mail or Web server.
- It can be configured to have one or two firewalls.
- It contains servers that are only used by internal network users.
- Which of the following is true about network address translation (NAT)?
- It substitutes MAC addresses for IP addresses.
- It removes private addresses when the packet leaves the network.
- It can only be found on core routers.
- It can be stateful or stateless.
- Which of the following is not an advantage of a load balancer?
- The risk of overloading a desktop client is reduced.
- Network hosts can benefit from having optimized bandwidth.
- Network downtime can be reduced.
- DoS attacks can be detected and stopped.
- Which is another name for a packet filter?
- proxy server
- reverse proxy server
- DMZ
- firewall
- A _____ firewall allows the administrator to create sets of related parameters that together define one aspect of the device’s operation.
- rule-based
- host-based
- signature-based
- settings-based
- A(n) _____ intercepts internal user requests and then processes that request on behalf of the user.
- content filter
- host detection server
- proxy server
- intrusion prevention device
- A reverse proxy ______.
- only handles outgoing requests
- is the same as a proxy server
- must be used together with a firewall
- routes incoming requests to the correct server
- Which is the preferred location for a spam filter?
- Install the spam filter with the SMTP server.
- Install the spam filter on the POP3 server.
- Install the spam filter on the proxy server.
- Install the spam filter on the local host client.
- A _____ watches for attacks and only sounds an alert when one occurs.
- network intrusion prevention system (NIPS)
- proxy intrusion device
- network intrusion detection system (NIDS)
- firewall
- A multipurpose security device is known as a(n) ______.
- unified attack management system (UAMS)
- intrusion detection/prevention device
- all-in-one network security appliance
- proxy security system (PSS)
- Each of the following can be used to hide information about the internal network except ______.
- a protocol analyzer
- a proxy server
- network address translation (NAT)
- subnetting
- What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
- A NIPS can take actions quicker to combat an attack.
- A NIDS provides more valuable information about attacks.
- A NIPS is much slower because it uses protocol analysis.
- There is no difference because a NIDS and a NIPS are equal.
- A variation of NAT that is commonly found on home routers is ______.
- Port address translation (PAT)
- Network proxy translation (NPT)
- Network address IP transformation (NAIPT)
- Subnet transformation (ST)
- If a device is determined to have an out-of-date virus signature file, then Network Access Control (NAC) can redirect that device to a network by ______.
- a Trojan horse
- TCP/IP hijacking
- Address Resolution Protocol (ARP) poisoning
- DHCP man-in-the-middle
- Each of the following is an option in a firewall rule except ______.
- prompt
- block
- delay
- allow
- A firewall using _____ is the most secure type of firewall.
- stateful packet filtering
- network intrusion detection system replay
- stateless packet filtering
- reverse proxy analysis