Identify the configuration that is best for networks with varying security levels, such as general users, a group of users working on a secret research project, and a group of executives.
A. |
Ordinary firewall |
|
B. |
Screened subnet firewall |
|
C. |
Border firewall |
|
D. |
Multilayered firewall |
What does a “screened subnet” refer to?
A. |
DMZ |
|
B. |
Stateful inspection firewall |
|
C. |
Border firewall |
|
D. |
IPS |
Identify the configuration that is best for hosting a public Web site or your own e-mail server, for which you need to allow inbound connections on a limited basis.
A. |
Multilayered firewall |
|
B. |
Screened subnet firewall |
|
C. |
Ordinary firewall |
|
D. |
Border firewall |
Which of the following is a weakness of WLANs?
A. |
WPA |
|
B. |
User groups |
|
C. |
RF shielding |
|
D. |
SSID beaconing |
Ans.
1. Option B Screened Subnet Firewall
Screened subnet firewall is best for networks with varying security levels, such as general users, a group of users working on a secret research project, and a group of executives.
2. Option A DMZ
Screened subnet firewall is refer to DMZ (Demilitarised Zone)
3. Option D Border firewall
Border firewall is that is best for hosting a public Web site or your own e-mail server, for which you need to allow inbound connections on a limited basis.
4. Option D SSID beacoing
SSID is weakeness of WLANs
Identify the configuration that is best for networks with varying security levels, such as general users,...