Question: Question 16 (1 point) Which type of network device is used to create logically secured virtual area networks that restrict visibility of network traffic by
Question 16 (1 point)
Which type of network device is used to create logically secured virtual area networks that restrict visibility of network traffic by limiting the movement of network packets?
Question 16 options:
|
| A. A router |
|
| B. A proxy |
|
| C. A managed switch |
|
| D. A server |
Question 17 (1 point)
From the following list, identify the network device that provides the main defense against IP spoofing attacks?
Question 17 options:
|
| A. An anomaly-based IPS device |
|
| B. A packet filtering device |
|
| C. A gateway device |
|
| D. Managed switches |
Question 18 (1 point)
Which types of network devices are flood attacks generally directed to? (Select all that apply)
Question 18 options:
|
| A. Switches |
|
| B. Routers |
|
| C. Servers |
|
| D. Gateways |
Question 19 (1 point)
Which of the following parameters are spoofing attacks typically based on? (Select all that apply)
Question 19 options:
|
| A. MAC addresses |
|
| B. Network addresses |
|
| C. Subnet masks |
|
| D. IP addresses |
Question 20 (1 point)
Identify network locations where ACLs are stored. (Select all that apply)
Question 20 options:
|
| A. Managed Switches |
|
| B. Servers |
|
| C. Local Hosts |
|
| D. Intrusion Detection Devices |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
