Switches and wireless access points

Assignment Help Computer Networking
Reference no: EM133893742

Questions

1. Which of the following do switches and wireless access points use to control access through a device?

IP address filtering

Session filtering

Port number filtering

MAC address filtering

2. Which of the following IDS detection types compare behavior to baseline profiles or network behavior baselines?

Anomaly-based

Cloud-based

Signature-based

Protocol-based

3. You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two.

What might be causing the problem?

The router has not been configured to perform port forwarding.

A firewall is blocking ports 80 and 443.

A proxy server is blocking access to the websites.

Port triggering is redirecting traffic to the wrong IP address.

4. Which type of security control identifies, logs, and reports incidents as they happen?

Deterrent

Compensating

Corrective

Detective

5. As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices.

You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.

Which solution should you implement?

Host-based IDS

Port scanner

Network-based IDS

Protocol analyzer

6. What needs to be configured on a firewall to allow traffic directed to the public resource in the DMZ?

VPN

Subnet

Packet filters

FTP

Reference no: EM133893742

Questions Cloud

Periodic acoustic synchronization signals : Two nodes A and B use RBS to receive periodic acoustic synchronization signals from a reference node.
Criminal proceeding are of interest : Provide a brief essay describing the facts in the case. The parties in the case and the criminal proceeding are of interest,
What are potential effects of demographic changes : What are the potential effects of demographic changes and automation on the labour market,
Topsecret is cloud company with mission : Topsecret is a cloud company with a mission to provide safe cloud storage. Is it possible to identify whether the bad actor was an insider or outsider?
Switches and wireless access points : Which of the following do switches and wireless access points use to control access through a device?
Training due to the oft-quoted security maxim : You provide a lecture to the working group regarding the importance of security education, awareness, and training due to the oft-quoted security maxim
Data is critical in making effective business decisions : Data is critical in making effective business decisions in today's workplace. Provide an example of how data is used in your current work
VoIP contribute to Universal Service Fund : Describe why should VoIP contribute to Universal Service Fund (USF) and pay local or state taxes. What impacts does net neutrality have on VoIP?
Managing digital certificates and communication encryption : Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd