Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address?
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices.
Which of the following protocols is used by VPN for tunneling?
Which of the following techniques is used to identify attacks originating from a botnet?
Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. (Choose two.)
The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets.
On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information?
Each correct answer represents a complete solution. (Choose all that apply.)
Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
Which of the following features are supported by Secure Shell?
Each correct answer represents a complete solution. (Choose all that apply.)
Fill in the blank with the appropriate tool name.
______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.
You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed.
What type of response is the IDS giving?
Which of the following tools is an open source protocol analyzer that can capture traffic in real time?
Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?