NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Sniffers
|
|
NIDS
|
|
Firewalls
|
|
Layer 2 Switches
|
Detailed explanation-1: -Which of the following network architecture concepts is used to securely isolate at the boundary between networks? Explanation: A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access.
Detailed explanation-2: -Firewalls can protect against employees copying confidential data from within the network. Software firewalls are usually more scalable than hardware firewalls. Stateless packet filtering keeps a record of connections that a host computer has made with other computers.
Detailed explanation-3: -Restrictive policy-Calls for a firewall and associated network security components to deny all traffic by default.
Detailed explanation-4: -For those who understand the OSI (Open System Interconnection) model of networking, the technical difference between a proxy and a NAT is that the proxy server works on the transport layer (layer 4) or higher of the OSI model, whereas a NAT works on the network layer (layer 3).