Reference no: EM133893742
Questions
1. Which of the following do switches and wireless access points use to control access through a device?
IP address filtering
Session filtering
Port number filtering
MAC address filtering
2. Which of the following IDS detection types compare behavior to baseline profiles or network behavior baselines?
Anomaly-based
Cloud-based
Signature-based
Protocol-based
3. You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two.
What might be causing the problem?
The router has not been configured to perform port forwarding.
A firewall is blocking ports 80 and 443.
A proxy server is blocking access to the websites.
Port triggering is redirecting traffic to the wrong IP address.
4. Which type of security control identifies, logs, and reports incidents as they happen?
Deterrent
Compensating
Corrective
Detective
5. As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices.
You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.
Which solution should you implement?
Host-based IDS
Port scanner
Network-based IDS
Protocol analyzer
6. What needs to be configured on a firewall to allow traffic directed to the public resource in the DMZ?
VPN
Subnet
Packet filters
FTP