Question
1. You set up your organizations VPN, so that only sensitive, private, and confidential traffic must travel through the encrypted tunnel. Public data does not
1. You set up your organization’s VPN, so that only sensitive, private, and confidential traffic must travel through the encrypted tunnel. Public data does not travel through the VPN. This speeds up the VPN. Which of the following technologies are you MOST likely using?
A. split tunnel VPN
B. on-demand VPN
C. always-on VPN
D. full tunnel VPN
2. What is the main protocol used by STP and RSTP?
A. HTML5
B. Bridge Protocol Data Unit (BPDU)
C. Dynamic Host Configuration Protocol (DHCP)
D. Layer 2 tunneling protocol (L2TP)
3. What is a restricted public network that provides access to resources for third parties such as business partners, customers, vendors, and suppliers?
A. Extranet
B. Intranet
C. Demilitarized zone (DMZ)
D. Zero Trust
4. Which of the following technologies is a device that collects and monitors traffic and sends the raw data to the NIDS?
A. HIDS
B. network tap
C. sensor
D. port mirror
5. What is a technology that focuses on preventing web application attacks?
A. wireless router
B. WAF (web application firewall)
C. file integrity monitor
D. WAP (wireless access point)
6. What type of virtual private network (VPN) connects a user to a private intranet across the public Internet? This is also known as a host-to-gateway VPN.
A. Site-to-site
B. Full tunnel
C. Split tunnel
D. Remote-access
7. What is the advantage of having both host-based firewalls and network-based firewalls?
A. security through obscurity
B. run faster
C. layered security
D. cost less
8. You are setting up an anomaly-based IDS to monitor network activity. Which of the following would you set up first?
A. a switch
B. a baseline of the current network behavior
C. a router
D. a database of known vulnerabilities and attack patterns
9. Where would we find web servers, mail servers and CA (Certificate Authority) servers?
A. In the North-South traffic
B. In the demilitarized zone (DMZ)
C. In a virtual private network (VPN)
D. In the East-West traffic
10. What network device always sends all packets to all computers?
A. switch
B. router
C. firewall
D. hub
Step by Step Solution
There are 3 Steps involved in it
Step: 1
1 The correct answer is A split tunnel VPN In a split tunnel VPN configuration only traffic destined for the organizations network goes through the VP...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started