hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Security + Mod 9 quiz
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (20)
Data within the application message itself
Which of these is NOT used in scheduling a load balancer?
Stateful packet filtering
Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?
Visibility
Which of the following is NOT a firewall rule parameter?
High-interaction honeypot
Which of the following contains honeyfiles and fake telemetry?
it must be used on HTML5 compliant devices
Which of the following is NOT correct about L2TP?
Active-active
In which of the following configurations are all the load balancers always active?
Split tunnel
sofie needs to configure the VPN to preserve bandwidth. Which configuration would she choose?
Forward proxy server
Which device intercepts internal user requests and then processes those requests on behalf of the users?
Update Active Directory to indicate the device is vulnerable.
Which of the following is NOT a NAC option when it detects a vulnerable endpoint?
DNS sinkhole
Maja has been asked to investigate DDoS mitigations. Which of the following should Maja consider?
t detects when a BPDU is received from an endpoint.
How does BPDU guard provide protection?
UTM
Which of these appliances provides the broadest protection by combining several security functions?
MAC address schema
Which of the following is not a basic configuration management tool?
A firewall that runs in the cloud
What is a virtual firewall?
It contains servers that are used only by internal network users.
Which statement regarding a demilitarized zone (DMZ) is NOT true?
Allow
Which firewall rule action implicitly denies all other traffic unless explicitly allowed?
Masking
Hanna has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?
Fingerprint authentication
Which of the following functions does a network hardware security module NOT perform?
Anomaly monitoring
Which type of monitoring methodology looks for statistical deviations from a baseline?
Policy-based firewall
Leah is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Leah consider purchasing that supports her need?
Sets found in the same folder
Security+ Post Assessment
90 terms
CSIA105 pre-assessment
30 terms
CSIA 105
116 terms
CompTIA Module 1-4 Review Questions
80 terms
Other sets by this creator
Test Out Security Domain 3
339 terms
Test Out security Domain 5
72 terms
TestOut Security Domain 4
78 terms
Test out security Domain 2
189 terms
Other Quizlet sets
environmental science test 1
75 terms
quiz 4- periodontal diseases
27 terms
TX GOV RQ.3
20 terms
Test 1 (week 1-4)
20 terms