Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?
Which of the following steps is involved in the network planning process?
Which of the following fields is NOT included in packet fragmentation?
Which of the following modules registers DNAT-based and SNAT-based transformations?
Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?
Each correct answer represents a part of the solution. Choose three.
A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?
Which of the following is a Cisco IOS management term described in the statement below?
"It is the fourth digit in the configuration register and contains a hexadecimal value. The bootstrap program uses its value to choose which operating system to load into RAM."
You are the Administrator for a corporate network. You are concerned about denial of service attacks.
Which of the following would be most helpful against Denial of Service (DOS) attacks?