Firewalls provide security through what mechanism?
Watching for intrusions
Controlling traffic entering and leaving a network
Requiring strong passwords
Preventing misuse of company resources
A switch can be used to prevent broadcast storms between connected systems through the use of what?
SSL
S/MIME
VLANs
LDAP
Which form of cable media is least vulnerable to eavesdropping?
Fiber optic
STP
Coax
Wireless
What is a blind FTP site?
A site where users don't authenticate
A site where all traffic is encrypted
A site where only anonymous access is allowed
A site where users can upload but not download
Which of the following allows the deployment of a publicly accessible web server without compromising the security of the private network?
Intranet
DMZ
Extranet
Switch
Which of the following is not one of the IP address ranges reserved for private use by RFC 1918?
10.0.0.0–10.255.255.255
192.168.0.0–192.168.255.255
169.254.0.0–169.254.255.255
172.16.0.0–172.31.255.255
A network-based IDS is not suitable for detecting or protecting against which of the following?
E-mail spoofing
Denial-of-service attacks
Attacks against the network
Attacks against an environment that produce significant traffic
What tool is used to lure or retain intruders in order to gather sufficient evidence without compromising the security of the private network?
Firewall
IDS
Router
Honeypot
Which of the following is a denial-of-service attack that uses network packets that have been spoofed so that the source and destination address are that of the victim?
Land
Teardrop
Smurf
Fraggle
What is the purpose of a site survey?
Improve wireless signal strength
Eliminate unwanted access locations
Distribute WEP keys
Plan the design of a wired network
3.138.106.32