This preview has intentionally blurred sections. Sign up to view the full version.
Unformatted text preview: 11. What is a difference between a DMZ and an extranet? A. VPN required for access. 12. What is the primary security concern with wireless connections? E. Signal propagation. 13. What are two elements of network design that have the greatest risk of causing a DoS? B. Single point of failure. C. Bottlenecks. 14. For what type of threat are there no current defenses? D. Zero day. 15. Which of the following is true regarding a layer 2 address and layer 3 address? E. Both C and D are true. 16. Which of the following are not benefits of IPv6? B. RFC 1918 Address. 17. What is the most common default security stance employed on firewalls? D. Denying by default. 18. What is egress filtering? C. Examining traffic as it leaves a network. 19. Which of the following is not a feature of a proxy server? E. MAC Address Filtering. 20. Which of the following is allowed under NAC if a host is lacking a security patch? E. Access to remediation servers....
View Full Document
- Spring '14
- Computer network, IP address, Virtual private network, remote access, Computer network security