Question

In: Computer Science

29. Question 29 For added security you decide to protect your network by conducting both a...

29.

Question 29

For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done?

1 point

You must install 2 firewalls in series, so all packets pass through the stateless firewall first and then the stateless firewall.

Install a single firewall that is capable of conducting both stateless and stateful inspections.

Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in addition to state related factors.

You must install the stateful and stateless firewalls in parallel with an intelligent switch in front of them to direct the packets to one or the other as appropriate.

30.

Question 30

Which statement best describes configuring a NAT router to use overload mapping?

1 point

The NAT router uses each computer's IP address for both internal and external communication.

Unregistered IP addresses are mapped to registered IP addresses as they are needed.

The organization will need as many registered IP addresses as it has computers that need Internet access.

Many unregistered IP addresses are mapped to a single registered IP address using different port numbers.

31.

Question 31

Which address type does a computer use to get a new IP address when it boots up?

1 point

The network's DHCP server address.

The network's DNS server address.

The computer's IP address.

The computer's domain name.

The network's default gateway address.

The computer's MAC address.

32.

Question 32

In IPv4, how many of the 4 octets are used to define the network portion of the address in a Class B network?

1 point

1

2

3

4

33.

Question 33

Which three (3) of these statements comparing UDP and TCP are True? (Select 3)

1 point

UDP is more reliable than TCP.

TCP is connectionless.

UDP is faster than TCP.

UDP is connectionless.

TCP is more reliable than UDP.

TCP is faster than UDP.

34.

Question 34

Which type of firewall understands which session a packet belongs to and analyzes it accordingly?

1 point

An Advanced Firewall (AFW).

A Connection Firewall (CFW).

A Next Generation Firewall (NGFW).

A Session Firewall (SFW).

35.

Question 35

You are concerned that your organization is really not very experienced with securing data sources. Which hosting model would require you to secure the fewest data sources?

1 point

On premise

PaaS

SaaS

IaaS

Solutions

Expert Solution

Question 29

For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done?

Answer:Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in addition to state related factors.

Explanation:Statefull firewall are advanced than ststeless firewall Hence,these are extension of stateless firewall.

Question 30

Which statement best describes configuring a NAT router to use overload mapping?

Answer:Many unregistered IP addresses are mapped to a single registered IP address using different port numbers.

Explanation:Converting into single IP address because it allows all bussiness over the worls to access of internet through single IP address.

Question 31

Which address type does a computer use to get a new IP address when it boots up?

Answer:The network's DHCP server address.

Explanation:Dynamic Host Configuration Protocol , based on IP address configures the devices.

Question 32

In IPv4, how many of the 4 octets are used to define the network portion of the address in a Class B network?

Answer:2 octets

Explanation:Class A - 1 octet , Class B - 2 Octet , Class C - First 3 octets.

Question 33

Which three (3) of these statements comparing UDP and TCP are True? (Select 3)

Answer:UDP is faster than TCP , UDP is connectionless.TCP is more reliable than UDP.

Explanation:TCP is reliable UDP is notreliable,So option 1 is FALSE.

UDP is connectionless while TCP is connection-oriented Protocol,So option 2 is FALSE.

UDP is faster than TCP,So option 6 is FALSE.

Question 34

Which type of firewall understands which session a packet belongs to and analyzes it accordingly?

Answer:A Session Firewall(SFW).

Question 35

You are concerned that your organization is really not very experienced with securing data sources. Which hosting model would require you to secure the fewest data sources?

Answer:Software as a Service(Saas).

Explanation:Software as a service has more built in security than Platform as a service and Infrastructure as a service.


Related Solutions

As you increase the security of your network, you are concerned that the added security measures...
As you increase the security of your network, you are concerned that the added security measures may impact in ways you had not intended. For example, how could a firewall have a negative impact on business from the following list? Explain It can filter packets from a site known to cause DoS attacks. It can filter packets that have a virus signature. It can block traffic that should be allowed through. It can log every packet that is transmitted.
You have joined a company as a network security analyst. Your CTO came to know you...
You have joined a company as a network security analyst. Your CTO came to know you are a graduate from MIT Melbourne/Sydney and successfully completed a VPN unit. Therefore, you have been asked to develop a security plan for your customers and remote managers for their Internet access to the business. You need to analyse the following cases and recommend the solutions for the question quen-1) You want to assist customers in building trust with your company. Discuss with your...
Network Security Question: Explain what is DNSSEC, and Services terms
Network Security Question: Explain what is DNSSEC, and Services terms
You want to use a packet firewall to protect the Hospital network but you are hesitant...
You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.  
You are considering adding a new security to your portfolio. To decide whether you should add...
You are considering adding a new security to your portfolio. To decide whether you should add the security, you need to know the security's: A. Expected return and variance only B. Expected return only C. Expected return, variance, and covariance D. Expected return and covariance only
Why would businesses need to have both firewalls and IDS and IPS to protect security? Give...
Why would businesses need to have both firewalls and IDS and IPS to protect security? Give specific examples of features that firewalls can do but IDS/IPS cannot and also vice versa. PLEASE EXPLAIN IN DETAIL, AND ALSO PROVIDE REFERENCES. THANK YOU.
Reasons for why a security audit is necessary with your recommendations for conducting such an audit:...
Reasons for why a security audit is necessary with your recommendations for conducting such an audit: -Potential costs (personnel, finances, etc.) -Proposed audit timeline -Two recommend methodologies (Audit)
Create a list of five practical and free precautions you can take to protect your Social Security number.
Create a list of five practical and free precautions you can take to protect your Social Security number.
Discuss different security websites or network and security informational sites that you may already monitor and...
Discuss different security websites or network and security informational sites that you may already monitor and why. Limit the discussion to no more than three sites.
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading...
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading network designer and security provider for the small-scale offices. As the Network and security engineer you are required to perform the following tasks. Task 1: Propose a network design for small scale office (Ex: Business type, departments, building plan). You are free to assume the name of the office and number of staffs ➢ Purpose of the Project ➢ Network overview (ex: connecting PCs,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT