Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

D Question 1 1 pts What type of attack would allow the attacker could trick computers into sending traffic through the attacker's computer (performing a

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
D Question 1 1 pts What type of attack would allow the attacker could trick computers into sending traffic through the attacker's computer (performing a Mit attack) and therefore, examine traffic that would not normally be accessible to him (on a switched network). Malware O Packet Sniffing ARP poisoning O SSL Strip Question 2 1 pts A is program that can be used in NAC to gather information about a device, such as patch status and anti-virus status. O quarantine network O policy server O agent captive portal Question 3 1 pts A subnet uses two firewalls, one external and one internal. O extranet triple homed DMZ O screened Question 4 1 pts Why would you deploy a layer 3 switch in place of a ordinary LAN (layer 2) switch? Layer 3 switches have more ports Layer 3 switches can route between VLANS O 3 Layers is better than 2 Layers Layer 3 switches always have a built in firewall D Question 5 1 pts A network segment that has no connectivity to other segments is known as segregation O air gapped offline Ozones D Question 6 1 pts can be used to create a list To limit what devices can connect to a network port, MAC of authorized MAC addresses. noodine spoofine Osnooping O filtering Question 7 1 pts Private or reserved IP ranges known as are likely spoofed IP addresses. martians known bad dark web bogons Question 8 1 pts An is a zone that allows controlled access to semi-trusted hosts, implying some sort of authentication O DMZ intranet Intemet O extranet Question 9 1 pts Network segments can be established logically with the use of O ACLS O NAT Switches O VLANS D Question 10 1 pts What technology would you use to enable private addressing on the LAN and still permit hosts to browse the web? Routing protocols O ACL O NAT O EAPOL

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Medical Image Databases

Authors: Stephen T.C. Wong

1st Edition

1461375398, 978-1461375395

More Books

Students also viewed these Databases questions