Front | Back |
______ monitor internet traffic and block access to preselected websites and files.
Proxy servers / Protocol analyzers
/ intenet content filters / NIDS |
Internet content filters
|
A software based ________ attempts to monitor and possibly prevent attempts to attack a local system.
SIDS / PIDS
/ NIDS / HIDS |
HIDS
|
The goal of _______ is to prevent computers with sub-optimal security from potentially infecting other computers through the network.
PAT / NAT
/ subnetting / NAC |
NAC
|
_____ examines the current state of a system or network device before it is allowed to connect to the network.
NAC / NAT
/ VAC / PAT |
NAC
|
A variation of NAT is _______. Instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different TCP port number.
DAT / CAT
/ TAT / PAT |
PAT
|
Using ________, networks can essentially be divided into three parts: network, subnet, and host.
stateful addressing / stateless addressing
/ subnetting / classful addressing |
SUBNETTING
|
At regular intervals a wireless AP sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ______.
caching / mapping
/ scanning / beaconing |
BEACONING
|
In order for a host using TCP/IP on an Ethernet network to find the MAC address of another device. it uses ______.
MAC-DNS / ARP
/ DNS / BIND |
ARP
|
DNS poisoning can be prevented by using the latest editions of the DNS software, _____.
DNSS BINDSEC
/ BIND IPsec |
BIND
|
A(n) _____ attack makes a copy of the transmission before sending it to the recipient at a later time.
man-in-the-middle / replay
/ ARP poisoning / DNS spoofing |
REPLAY
|
With wireless CSMA/CA, the amout of time that a device must wait after the medium is clear is called the ______ time.
collision / slot
/ tx / clear |
SLOT
|
_______ allows the administrator to configure a switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch.
Port Mirroring / Sniffing
/ Protocol Analyzer / NIC mirroring |
PORT MIRRORING
|
The _____ record is an entry in the Domain Name System (DNS) that identifies the mail server responsible for handling that domain name.
IM / AX
/ DEP / MX |
MX
|
In a P2P network, a ______ is a server program operated by the person or organization that wants to share the file.
torrent / seed
/ tracker / leecher |
TRACKER
|
Regarding email, _____ is responsible for incoming mail.
IMAP4 / SNMP / POP3 / SMTP |
POP3
|