Filters
Question type

Study Flashcards

In what type of attack are zombies usually put to use?


A) buffer overrun
B) virus
C) DDoS
D) spoofing

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A DMZ is a subnet of _____________ accessible servers placed outside the internal network.

Correct Answer

verifed

verified

Where should network management systems generally be placed?


A) out of band
B) in the DMZ
C) on the perimeter
D) in the server farm

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

How can using two firewalls help in protecting your network?

Correct Answer

verifed

verified

Using two firewalls helps in the followi...

View Answer

What is a reverse firewall and why would you use one?

Correct Answer

verifed

verified

Some forward-thinking companies install ...

View Answer

What is a bastion host and how is one typically configured?

Correct Answer

verifed

verified

A bastion host is a computer on the netw...

View Answer

MATCHING -a computer configured with more than one network interface


A) dual-homed host
B) load-balancing software
C) many-to-one NAT
D) one-to-one NAT
E) proxy server
F) reverse firewall
G) screened host
H) screening router
I) server farm
J) three-pronged firewall

K) A) and B)
L) D) and F)

Correct Answer

verifed

verified

Which of the following best describes a bastion host?


A) a host with two or more network interfaces
B) a computer on the perimeter network that is highly protected
C) a computer running a standard OS that also has proxy software installed
D) a computer running only embedded firmware

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Why is a bastion host the system most likely to be attacked?


A) it has weak security
B) it contains company documents
C) it is available to external users
D) it contains the default administrator account

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

MATCHING -a group of servers connected in a subnet that work together to receive requests


A) dual-homed host
B) load-balancing software
C) many-to-one NAT
D) one-to-one NAT
E) proxy server
F) reverse firewall
G) screened host
H) screening router
I) server farm
J) three-pronged firewall

K) A) and E)
L) H) and J)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer