Читайте также:
|
|
A. Routing table
B. Bridging table
C. State table
D. Connection table
E. Hub table
A _________-level proxy inspects the entire packet and makes access decisions based on the contents of the packet.
A. Circuit
B. Application
C. Proxy
D. Server
E. Physical
A datagram is called ______ at the physcial layer of OSI.
A. Bits
B. Segments
C. Frames
D. Packets
E. Bytes
24. A(n) ________ is a fancy term for a computer that has two network interfaces/
A. Proxy gateway
B. Duel-homed host
C. Routing workstation
D. NAT server
E. None of the statements
Is another term for a packet of digital information.
A. Footer
B. Header
C. Data
D. Datagram
E. Bits
Some _________ firewalls are able to examine the contents of packets as well as the headers for signs that they are legitimate.
A. Boundary
B. Stateful
C. Stateless
D. Personal
E. DMZ
27. What is one advantage of setting up a DMZ with two firewalls?
A. You can control where traffic goes in the three networks
B. You can do stateful packet filtering
C. You can do load balancing
D. Improved network performance
E. All of the statements
Possibility of an incident or attack to cause damage to your enterprise
A. Risk
B. Virus
C. Security
D. Assets
E. Malware
One objective of cryptography is prevention of authorized access to resources or the delaying of time-critical operations.
A. Authentication
B. Denial of service
C. Availability
D. Reliability
E. Confidentiality
Дата добавления: 2015-08-18; просмотров: 145 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
You can use ____________ to protect your computer from outsiders. | | | Match each term according to their meanings in Public-Key Cryptosystem |