Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following is True about Application Proxy Firewall? Operates at Layer 3 in router or HW firewall Can reconstruct layer 4 traffic in

Which of the following is True about Application Proxy Firewall?

Operates at Layer 3 in router or HW firewall
Can reconstruct layer 4 traffic in addition to Layer 3 reassembly
Traffic source is unaware of proxy
Leverage basic network stack functionality to sanitize application level traffic

Flag this Question

Question 65 pts

Which of the following is True about Packet Filter Firewall?

Leverage basic network stack functionality to sanitize application level traffic
Firewall software runs in application space on firewall
Blocks traffic based on source & destination address, ports & protocols
Can reconstruct layer 4 traffic in addition to Layer 3 reassembly

Flag this Question

Question 75 pts

Network Quality of Service (QoS) is critical in maintaining performance of priority applications & traffic during degraded network conditions even during network attack or partial failure in network.

True
False

Flag this Question

Question 85 pts

Which type of Intrusion Detection & Prevention Systems (IDPS) monitors activity on individual systems to identify unauthorized or suspicious activity on operating system (OS)?

Knowledge-based
Behavior-based
Host-based
Network-based

Flag this Question

Question 95 pts

Which type of Intrusion Detection & Prevention Systems (IDPS) includes database of signatures associated with malicious or unauthorized activity to compare activity data against and respond when match identified?

Behavior-based
Network-based
Knowledge-based
Host-based

Flag this Question

Question 105 pts

Which of the following is an Intrusion Handling Eradication activity?

Tighten firewalls
Use Honeypots to observe attacks
Gather information about attacker
Gather evidence & take action against attacker

Flag this Question

Question 115 pts

ZigBee complies with IEEE 802.15.4 as wireless mesh network used primarily for Internet of Things (IoT). Which of the following is NOT part of ZigBee protocol stack?

IPv6
UDP
HTTP
TCP

Flag this Question

Question 125 pts

Which of the following is True about Packet Filter Firewall?

Leverage basic network stack functionality to sanitize application level traffic
Cannot do reliable analysis of layer 4 or higher content
Firewall software runs in application space on firewall
Can reconstruct layer 4 traffic in addition to Layer 3 reassembly

Flag this Question

Question 135 pts

Which network technology provides secure tunnel for wide area connectivity to organization located in multiple sites?

Domain Name Server (DNS)
Virtual private network (VPN)
Hub
Switch

Flag this Question

Question 145 pts

Firewalls shield computers and network from malicious or unnecessary Internet traffic protecting against outside attacks from offensive Web sites and potential hackers.

True
False

Flag this Question

Question 155 pts

Quality of Service (QoS) variable depends on real-world network connections & trade-offs of acceptable cost, bandwidth, and error rate for any hop within network.

True
False

Flag this Question

Question 165 pts

Differentiated services code point (DSCP) value in IP header allows network devices supporting Diffserv to use DSCP value for proper QoS treatment for packet.

True
False

Flag this Question

Question 175 pts

Which network performance measure is based on changes in delay that occur and the duration of changes?

Throughput (capacity)
Quality of Service (QoS)
Latency (delay)
Jitter (variability)

Flag this Question

Question 185 pts

What is the de-facto industry standard for Software Defined Networking (SDN) controller-to-element communication?

OpenFlow
TLS
SNMP
DiffServ

Flag this Question

Question 195 pts

Which Intrusion Detection Systems (IDS) architecture component is responsible for gathering activity and event data for analysis?

Traffic Collector
Notifiers
Director
Agents

Flag this Question

Question 205 pts

Which of the following is NOT a goals of Firewalls?

Protect against outside attackers from offensive Web sites & potential hackers
Provide computers on internal networks with malicious and unnecessary Internet traffic
Separate networks with differing security requirements including Internet from internal network and wherever internal networks have varying security requirements
Insert network security by wrapping or interposing filters on network traffic

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design Application Development And Administration

Authors: Michael V. Mannino

3rd Edition

0071107010, 978-0071107013

Students also viewed these Databases questions

Question

What is DDL?

Answered: 1 week ago