Question: Question 16 (1 point) Which type of network device is used to create logically secured virtual area networks that restrict visibility of network traffic by

Question 16 (1 point)

Which type of network device is used to create logically secured virtual area networks that restrict visibility of network traffic by limiting the movement of network packets?

Question 16 options:

A. A router

B. A proxy

C. A managed switch

D. A server

Question 17 (1 point)

From the following list, identify the network device that provides the main defense against IP spoofing attacks?

Question 17 options:

A. An anomaly-based IPS device

B. A packet filtering device

C. A gateway device

D. Managed switches

Question 18 (1 point)

Which types of network devices are flood attacks generally directed to? (Select all that apply)

Question 18 options:

A. Switches

B. Routers

C. Servers

D. Gateways

Question 19 (1 point)

Which of the following parameters are spoofing attacks typically based on? (Select all that apply)

Question 19 options:

A. MAC addresses

B. Network addresses

C. Subnet masks

D. IP addresses

Question 20 (1 point)

Identify network locations where ACLs are stored. (Select all that apply)

Question 20 options:

A. Managed Switches

B. Servers

C. Local Hosts

D. Intrusion Detection Devices

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!