Which of the following is True about Application Proxy Firewall?
| Operates at Layer 3 in router or HW firewall |
| Can reconstruct layer 4 traffic in addition to Layer 3 reassembly |
| Traffic source is unaware of proxy |
| Leverage basic network stack functionality to sanitize application level traffic |
Flag this Question
Question 65 pts
Which of the following is True about Packet Filter Firewall?
| Leverage basic network stack functionality to sanitize application level traffic |
| Firewall software runs in application space on firewall |
| Blocks traffic based on source & destination address, ports & protocols |
| Can reconstruct layer 4 traffic in addition to Layer 3 reassembly |
Flag this Question
Question 75 pts
Network Quality of Service (QoS) is critical in maintaining performance of priority applications & traffic during degraded network conditions even during network attack or partial failure in network.
Flag this Question
Question 85 pts
Which type of Intrusion Detection & Prevention Systems (IDPS) monitors activity on individual systems to identify unauthorized or suspicious activity on operating system (OS)?
Flag this Question
Question 95 pts
Which type of Intrusion Detection & Prevention Systems (IDPS) includes database of signatures associated with malicious or unauthorized activity to compare activity data against and respond when match identified?
Flag this Question
Question 105 pts
Which of the following is an Intrusion Handling Eradication activity?
| Use Honeypots to observe attacks |
| Gather information about attacker |
| Gather evidence & take action against attacker |
Flag this Question
Question 115 pts
ZigBee complies with IEEE 802.15.4 as wireless mesh network used primarily for Internet of Things (IoT). Which of the following is NOT part of ZigBee protocol stack?
Flag this Question
Question 125 pts
Which of the following is True about Packet Filter Firewall?
| Leverage basic network stack functionality to sanitize application level traffic |
| Cannot do reliable analysis of layer 4 or higher content |
| Firewall software runs in application space on firewall |
| Can reconstruct layer 4 traffic in addition to Layer 3 reassembly |
Flag this Question
Question 135 pts
Which network technology provides secure tunnel for wide area connectivity to organization located in multiple sites?
| Virtual private network (VPN) |
Flag this Question
Question 145 pts
Firewalls shield computers and network from malicious or unnecessary Internet traffic protecting against outside attacks from offensive Web sites and potential hackers.
Flag this Question
Question 155 pts
Quality of Service (QoS) variable depends on real-world network connections & trade-offs of acceptable cost, bandwidth, and error rate for any hop within network.
Flag this Question
Question 165 pts
Differentiated services code point (DSCP) value in IP header allows network devices supporting Diffserv to use DSCP value for proper QoS treatment for packet.
Flag this Question
Question 175 pts
Which network performance measure is based on changes in delay that occur and the duration of changes?
Flag this Question
Question 185 pts
What is the de-facto industry standard for Software Defined Networking (SDN) controller-to-element communication?
Flag this Question
Question 195 pts
Which Intrusion Detection Systems (IDS) architecture component is responsible for gathering activity and event data for analysis?
Flag this Question
Question 205 pts
Which of the following is NOT a goals of Firewalls?
| Protect against outside attackers from offensive Web sites & potential hackers |
| Provide computers on internal networks with malicious and unnecessary Internet traffic |
| Separate networks with differing security requirements including Internet from internal network and wherever internal networks have varying security requirements |
| Insert network security by wrapping or interposing filters on network traffic |