Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

A.

Dynamic NAT

B.

Cache NAT

C.

Port Address Translation (PAT)

D.

Static NAT

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?

A.

HTTP

B.

SSL

C.

UDP

D.

IPSec

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

A.

Active IDS

B.

Network-based IDS

C.

Signature-based IDS

D.

Passive IDS

Which of the following steps is involved in the network planning process?

A.

Analysis/Forecasting

B.

Data acquisition

C.

Documentation and analysis of results

D.

Network-synthesis

Which of the following fields is NOT included in packet fragmentation?

A.

Flag

B.

Fragment Offset

C.

Identification

D.

Time to Live

Which of the following modules registers DNAT-based and SNAT-based transformations?

A.

iptable_nat

B.

iptable_filter

C.

iptable_mangle

D.

iptable_raw

Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?

Each correct answer represents a part of the solution. Choose three.

A.

Datagram Identification Number field

B.

Fragment Offset field

C.

Datagram Length field

D.

Flags field

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

A.

IPChains

B.

Stunnel

C.

IPTables

D.

OpenSSH

Which of the following is a Cisco IOS management term described in the statement below?

"It is the fourth digit in the configuration register and contains a hexadecimal value. The bootstrap program uses its value to choose which operating system to load into RAM."

A.

Boot check

B.

Boot field

C.

Boot

D.

Boot value

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

A.

Stateful Packet Inspection (SPI) firewall

B.

Packet filtering firewall

C.

Network surveys.

D.

Honey pot