Which of the protocols listed below provide protection against switching loops select 2 answers?

Which of the answers listed below illustrates the difference between passive and active security breach response?

   HIPS vs. NIPS
   UTM vs. Firewall
   CSMA/CD vs. CSMA/CA
   IDS vs. IPS

IDS vs. IPS

Intrusion Detection System
vs
Intrusion Prevention Systems

 

Which of the following network security solutions inspects network traffic in real-time and has the capability to stop the ongoing attack?

   NIPS
   HIDS
   NIDS
   NIST

NIPS

Network-based Intrusion Prevention System

 

Which of the actions listed below can be taken by an IDS? (Select 2 answers)

   Firewall reconfiguration
   Closing down connection
   Logging
   Terminating process
   Sending an alert

 

A type of IDS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based IDS.

   True
   False

 

An IDS that detects intrusions by comparing network traffic against the previously established baseline can be classified as: (Select all that apply)

   Heuristic
   Anomaly-based
   Behavioral
   Signature-based

Heuristic
Anomaly-based
Behavioral

 

A security administrator configured an IDS to receive traffic from a network switch via port mirroring. Which of the following terms can be used to describe the operation mode of the IDS? (Select 2 answers)

   In-band
   Passive
   Inline
   Out-of-band

 

An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:

   Fault tolerance
   False positive error
   Quarantine function
   False negative error

 

Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?

   False negative
   True positive
   False positive
   True negative

 

A device designed to filter and transfer IP packets between dissimilar types of computer networks is called:

   Hub
   Switch
   Load balancer
   Router

 

Routers operate at: (Select 2 answers)

   Physical layer of the OSI model
   Application layer of the OSI model
   Layer 3 of the OSI model
   Network layer of the OSI model
   Layer 5 of the OSI model

Layer 3 of the OSI model
Network layer of the OSI model

 

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

   CRL
   NAT
   BCP
   ACL

 

Which of the following answers applies to a Rule-Based Access Control (RBAC) mechanism implemented on routers, switches, and firewalls?

   ACL
   CSR
   DLP
   AUP

 

What type of network traffic filtering criteria can be set on a router?

   Filtering by IP address
   Filtering by network protocol
   Filtering by subnet
   Filtering by logical port number
   All of the above

 

A properly configured antispoofing mechanism on a router should block Internet traffic from IP addresses in the range of:

   10.0.0.0/8
   172.16.0.0/12
   192.168.0.0/16
   All of the above

 

Which of the answers listed below refers to a data link layer (layer 2) device designed to forward data packets between Local Area Network (LAN) segments?

   Router
   Hub
   Switch
   Repeater

 

Which of the following answers applies to a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?

   IEEE 802.1X
   IEEE 802.11ac
   IEEE 802.1D
   IEEE 802.11x

 

The process of securing networking devices should include the practice of disabling unused physical ports.

   True
False

 

A network switch equipped with the routing capability is sometimes referred to as a layer 3 switch.

   True
   False

Which of the following protocols provide protection against switching loops? (Select 2 answers)
   RTP
   SRTP
   RDP
   STP
   RSTP

 

What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses?

   Honeypot
   Firewall
   Flood guard
   Antivirus

 

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

   Bridge
   Active hub
   Server
   Proxy

 

Which of the following statements describe the function of a forward proxy? (Select 2 answers)

   Acts on behalf of a client
   Hides the identity of a client
   Acts on behalf of a server
   Hides the identity of a server

Acts on behalf of a client
Hides the identity of a client

 

Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers)

   Acts on behalf of a client
   Hides the identity of a server
   Acts on behalf of a server
   Hides the identity of a client

Hides the identity of a server
Acts on behalf of a server

 

What are the characteristic features of a transparent proxy? (Select all that apply)

   Doesn't require client-side configuration
   Modifies client's requests and responses
   Redirects client's requests and responses without modifying them
   Clients might be unaware of the proxy service
   Requires client-side configuration

Doesn't require client-side configuration

Redirects client's requests and responses without modifying them

Clients might be unaware of the proxy service

 

A nontransparent proxy: (Select 2 answers)

   Modifies client's requests and responses
   Doesn't require client-side configuration
   Requires client-side configuration
   Redirects client's requests and responses without modifying them

Modifies client's requests and responses

Requires client-side configuration

Which of the protocols provide protection against switching loops?

Spanning Tree Protocol (STP) prevents switching loop problems and should be enabled.

Which of the devices listed below is used for separating broadcast domains?

Routers and other higher-layer devices form boundaries between broadcast domains.
The IPv6 neighbor discovery process uses ICMP messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local link), to verify the reachability of the neighbor, and to keep track of neighboring routers.

Which IPv6 protocol listed below is used by networked nodes for locating routers?

Which of the IPv6 protocols listed below is used by networked nodes for locating routers? Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4.