Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. You set up your organizations VPN, so that only sensitive, private, and confidential traffic must travel through the encrypted tunnel. Public data does not

1. You set up your organization’s VPN, so that only sensitive, private, and confidential traffic must travel through the encrypted tunnel. Public data does not travel through the VPN. This speeds up the VPN. Which of the following technologies are you MOST likely using?
    A.     split tunnel VPN
    B.     on-demand VPN
    C.     always-on VPN
    D.     full tunnel VPN

2. What is the main protocol used by STP and RSTP?
    A.     HTML5
    B.     Bridge Protocol Data Unit (BPDU)
    C.     Dynamic Host Configuration Protocol (DHCP)
    D.     Layer 2 tunneling protocol (L2TP)

3. What is a restricted public network that provides access to resources for third parties such as business partners, customers, vendors, and suppliers?
    A.     Extranet
    B.     Intranet
    C.     Demilitarized zone (DMZ)
    D.     Zero Trust

4. Which of the following technologies is a device that collects and monitors traffic and sends the raw data to the NIDS?
    A.     HIDS
    B.     network tap
    C.     sensor
    D.     port mirror

5. What is a technology that focuses on preventing web application attacks?
    A.     wireless router
    B.     WAF (web application firewall)
    C.     file integrity monitor
    D.     WAP (wireless access point)

6. What type of virtual private network (VPN) connects a user to a private intranet across the public Internet? This is also known as a host-to-gateway VPN.
    A.     Site-to-site
    B.     Full tunnel
    C.     Split tunnel
    D.     Remote-access

7. What is the advantage of having both host-based firewalls and network-based firewalls?
    A.     security through obscurity
    B.     run faster
    C.     layered security
    D.     cost less

8. You are setting up an anomaly-based IDS to monitor network activity. Which of the following would you set up first?
    A.     a switch
    B.     a baseline of the current network behavior
    C.     a router
    D.     a database of known vulnerabilities and attack patterns

9. Where would we find web servers, mail servers and CA (Certificate Authority) servers?
    A.     In the North-South traffic
    B.     In the demilitarized zone (DMZ)
    C.     In a virtual private network (VPN)
    D.     In the East-West traffic

10. What network device always sends all packets to all computers?
    A.     switch
    B.     router
    C.     firewall
    D.     hub

Step by Step Solution

There are 3 Steps involved in it

Step: 1

1 The correct answer is A split tunnel VPN In a split tunnel VPN configuration only traffic destined for the organizations network goes through the VP... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Income Tax Fundamentals 2013

Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill

31st Edition

1111972516, 978-1285586618, 1285586611, 978-1285613109, 978-1111972516

More Books

Students also viewed these Computer Network questions