Leandro is writing a firewall policy. He needs to define which type of firewall he needs for each portion of the infrastructure based on differing areas of risk and trust. What are these areas called?
Blog
True or False? A keyed hash gives us a way to verify that so…
True or False? A keyed hash gives us a way to verify that some of our own data has not been modified by an attacker or someone who doesn’t have the secret key.
Which of the following is a firewall, proxy, and routing ser…
Which of the following is a firewall, proxy, and routing service that does NOT support caching, encryption endpoint, or load balancing? Note that this service can be found on almost any service or device that supports network address translation.
All of the following are firewall management best practices,…
All of the following are firewall management best practices, EXCEPT:
How many hours a week (on average) did you work?
How many hours a week (on average) did you work?
Onion routing limits a network’s vulnerability to eavesdropp…
Onion routing limits a network’s vulnerability to eavesdropping and traffic analysis.
A company uses an Internet Protocol Security (IPSec) virtual…
A company uses an Internet Protocol Security (IPSec) virtual private network (VPN) solution. It allows remote users to connect to the main office and allows communication between the main office and branch offices securely over the Internet. The main office network uses network address translation (NAT) with an internal IP address range of 192.168.0.1 to 192.168.0.254. Which of the following ranges must remote offices and users NOT use on their internal networks?
Fatima has been hired as a contractor to decommission a netw…
Fatima has been hired as a contractor to decommission a network topology that has been employed by a small company since the 1990s. In studying the project specifications, she reads that this physical topology uses a special packet called tokens, and can be unidirectional or bidirectional. Although it has fewer collisions than other types of networks, this topology is rarely seen in the twenty-first century. Baffled as to what type of network this is, she goes on the Internet and researches the technology. What sort of topology does she find?
Network router security is primarily about preventing unauth…
Network router security is primarily about preventing unauthorized access.
Choose the item in column 2 that best matches each item in c…
Choose the item in column 2 that best matches each item in column 1.