What is one advantage of setting up a
DMZ(Demilitarized Zone) with two
firewalls?
a. You can control where traffic goes
in the three networks
b. You can do stateful packet filtering
c. You can do load balancing
d. Improve network performance

1 Answer

Answer :

a. You can control where traffic goes
in the three networks

Related questions

Description : What is the full form of DMZ a. Demilitarized Zone b. Demonetized Zone c. Demand Zone d. Demoralized Zone

Last Answer : d. Demoralized Zone

Description : What is the full form of DMZ a. Demilitarized Zone b. Demonetized Zone c. Demand Zone d. Demoralized Zone

Last Answer : a. Demilitarized Zone

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following are true about firewalls? 1) Filters network traffic 2) Can be either a hardware or software device 3) Follows a set of rules 4) All the above

Last Answer : 4) All the above

Description : Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above

Last Answer : 4 All the above

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : In _______delivery, the deliverer of theIP packet and the destination are on different networks. A) aconnection-oriented B) a direct C) an indirect D) none of the above

Last Answer : an indirect

Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these

Last Answer : b. Packet switching

Description : In computer networks _________ is a characteristic that a flow needs where Lack of it means losing a packet or acknowledgment, which entails retransmission. A. Reliability B. Delay C. Jitter D. Bandwidth

Last Answer : A. Reliability

Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub

Last Answer : c) router

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : The first paper published on firewall technology was in ____, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls: a) 1988 b) 1999 c) 1992 d) None of These

Last Answer : a) 1988

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only

Last Answer : c. (ii) and (iv) only

Description : Firewalls are used to protect: a) Home Networks b) Corporate Networks c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : Which of the following dynamically grow and shrink the load-balancing capacity to adjust to traffic demands? A. Amazon Cloud-front B. Elastic Caches C. Amazon RDS D. Elastic Load Balancing

Last Answer : Elastic Load Balancing

Description : What is the need for load balancing in cloud computing? a) Increased scalability b) Ability to handle sudden traffic spikes c) A and B both d) None of these

Last Answer : A and B both

Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer

Last Answer : A. an application level , an IP level

Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls

Last Answer : B. Unix

Description : You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and192.168.7.0. What subnet mask can you use to combine these addresses intoone? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252

Last Answer : 255.255.252.0

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol

Last Answer : d. routing information protocol

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above

Last Answer : Down through thelayers of the IP architecture and then up thelayers again

Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above

Last Answer : circuit-switched

Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above

Last Answer : destination

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : In _______delivery, both thedeliverer of the IP packet and the destination are on the same network. A) aconnectionless B) a direct C) an indirect D) none of the above

Last Answer : a direct

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address

Last Answer : b. a short VC number

Description : In an Ethernet local area network, which one of the following statements is TRUE ? a. A station stops to sense the channel once it starts transmitting a frame. b. The purpose ... collision is detected. d. The exponential backoff mechanism reduces the probability of collision on retransmissions

Last Answer : The exponential backoff mechanism reduces the probability of collision on retransmissions

Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address

Last Answer : B. a short VC number

Description : BSNL land line telephone network is an example of a network. A. Packet switched B. Circuit switched C. Bit switched D. Line switched

Last Answer : B. Circuit switched

Description : A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched

Last Answer : b) Circuit switched

Description : A network is a cross between a circuit-switched network and a datagram network. It has some characteristics of both. a. virtual-circuit b. packet-switched c. None of the Given d. frame-switched

Last Answer : a. virtual-circuit

Description : A local telephone network is an example of a network. a. Packet switched b. Circuit switched c. Bit switched d. Line switched

Last Answer : b. Circuit switched

Description : A network router joins two _________ together? A. Computers B. Switches C. Networks D. Gateway

Last Answer : C. Networks

Description : The secondgeneration of cable networks is called a(n) _________ network. A) HFC B) HCF C) CFH D) none of the above

Last Answer : HFC

Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : VOFR

Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above

Last Answer : a. i only

Description : The ability of a single network to span multiple physical networks is known as ______ a. Subnetting b. Masking c. Fragmenting d. Hopping

Last Answer : a. Subnetting

Description : . In addresses for _______ networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host. A. class A B. class C C. class B D. class D

Last Answer : C. class B

Description : Weighted voting of correction vectors is a technique of A : Recursive filtering B : FilteringC : Laandmark D : Pose estimation

Last Answer : A : Recursive filtering

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : Firewalls are often categorized as: a) Network Firewalls b) Host Based Firewalls c) Either Network firewalls or Host based firewalls d) None of These

Last Answer : c) Either Network firewalls or Host based firewalls