A _____ should be considered as a means to divide the world into two or more networks:
one or more secure networks and one or more non-secure networks.
A. firewall
B. ESP
C. SSL
D. both a and b

1 Answer

Answer :

A. firewall

Related questions

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : What does SSL stands for ? System socket layer Secure system login Secure socket layer Secure system login

Last Answer : Secure socket layer

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub

Last Answer : c) router

Description : What is SSL (Secure Sockets Layer)? (easy words)

Last Answer : answer:Easy words. SSL is a method of scrambling (or encrypting) web communications so that the only people that can read it are the sender and the receiver. To everyone else it is gobbledegook. - It is more complicated than that, of course.

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : In computer networks _________ is a characteristic that a flow needs where Lack of it means losing a packet or acknowledgment, which entails retransmission. A. Reliability B. Delay C. Jitter D. Bandwidth

Last Answer : A. Reliability

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure

Description : Toavoid collisions on wireless networks, ________was invented. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CA

Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above

Last Answer : a. i only

Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these

Last Answer : b. Packet switching

Description : We candivide today's networks into ____ broad categories. A) four B) three C) five D) two

Last Answer : three

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : For purposes of routing, the Internet isdivided into ___________. A) wide area networks B) autonomous networks C) autonomous systems D) none of the above

Last Answer : autonomous systems

Description : Which field of cookie in WWW represents the server's directory structure by identifying the utilization of part associated with server's file tree? a. Domain b. Path c. Content d. Secure

Last Answer : b. Path

Description : What does HTTPS stands for? A. Hyper Text Transmission Protocols B. Hyper Text Tile Protocols C. Hyper Text Transfer Protocol Secure D. None

Last Answer : C. Hyper Text Transfer Protocol Secure

Description : Name four factors needed for a secure network.

Last Answer : Privacy: The sender and the receiver expect confidentiality. Authentication: The receiver is sure of the sender's identity and that an imposter has not sent the message. Integrity: The data ... -Reputation: The receiver must able to prove that a received message came from a specific sender.

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer

Last Answer : A. an application level , an IP level

Description : In most Wide Area Networks, the subnet consists of two distinct components: which are they? A. Transmission Lines and Switching Elements. B. host and subnet C. Transmission Lines and host D. subnet and Switching Elements.

Last Answer : A. Transmission Lines and Switching Elements.

Description : A network router joins two _________ together? A. Computers B. Switches C. Networks D. Gateway

Last Answer : C. Networks

Description : The secondgeneration of cable networks is called a(n) _________ network. A) HFC B) HCF C) CFH D) none of the above

Last Answer : HFC

Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : VOFR

Description : In IPv6,a ______address is used ifa site with several networks uses the Internetprotocols but is not connectedto the Internet for security reasons. A) link local B) site local C) mapped D) none of the abov

Last Answer : site local

Description : In networks thatdo not support physical multicastaddressing, multicastingcan be accomplished through _______. A) mapping B) queries C) tunneling D) noneof the above

Last Answer : tunneling

Description : In ________, the multicastpacket must reach only those networks that haveactive members for thatparticular group. A) RPF B) RPB C) RPM D) none of the above

Last Answer : RPM

Description : In _______delivery, the deliverer of theIP packet and the destination are on different networks. A) aconnection-oriented B) a direct C) an indirect D) none of the above

Last Answer : an indirect

Description : ________ is a collection of many separate networks. A) A WAN B) An internet C) a LAN D) None of the above

Last Answer : An internet

Description : In the original ARPANET,_______ were directly connected together. A) IMPs B) host computers C) networks D) routers

Last Answer : IMPs

Description : MCI and AT&T are examples of whichof the following? A) Social networks B) Communications systems C) Internet service providers D) Mobisodes

Last Answer : Internet service providers

Description : You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and192.168.7.0. What subnet mask can you use to combine these addresses intoone? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252

Last Answer : 255.255.252.0

Description : Internet-like networks between a company and its businesspartners. Select the best fit for answer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Extranets

Description : Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit foranswer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Inter organizational networks

Description : Internet-like networks within an enterprise. A. Intranets B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Intranets

Description : How many hostsare attached to eachof the local area networks at your site? A. 128 B. 254 C. 256 D. 64 E. None of the above

Last Answer : 254

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : What is IP class and number of sub- networks if the subnet mask is 255.224.0.0? a. Class A, 3 b. Class A, 8 c. Class B, 3 d. Class B, 32

Last Answer : b. Class A, 8

Description : The ability of a single network to span multiple physical networks is known as ______ a. Subnetting b. Masking c. Fragmenting d. Hopping

Last Answer : a. Subnetting

Description : For large networks, which topology is used? a. Bus b. Tree c. Ring d. Mesh

Last Answer : b. Tree

Description : ………………... are needed to communicate with systems on other networks. A. repeaters B. amplifiers C. Bridge D. Gateways

Last Answer : D. Gateways